home *** CD-ROM | disk | FTP | other *** search
/ Chip 2007 January, February, March & April / Chip-Cover-CD-2007-02.iso / Pakiet bezpieczenstwa / mini Pentoo LiveCD 2006.1 / mpentoo-2006.1.iso / modules / nessus-2.2.8.mo / usr / lib / nessus / plugins / mandrake_MDKSA-2004-066.nasl < prev    next >
Text File  |  2005-01-14  |  5KB  |  172 lines

  1. #
  2. # (C) Tenable Network Security
  3. #
  4. # This plugin text was extracted from Mandrake Linux Security Advisory MDKSA-2004:066
  5. #
  6.  
  7.  
  8. if ( ! defined_func("bn_random") ) exit(0);
  9. if(description)
  10. {
  11.  script_id(14165);
  12.  script_bugtraq_id(10279, 10687);
  13.  script_version ("$Revision: 1.3 $");
  14.  script_cve_id("CAN-2004-0495", "CAN-2004-0497", "CAN-2004-0565", "CAN-2004-0587");
  15.  
  16.  name["english"] = "MDKSA-2004:066: kernel";
  17.  
  18.  script_name(english:name["english"]);
  19.  
  20.  desc["english"] = "
  21. The remote host is missing the patch for the advisory MDKSA-2004:066 (kernel).
  22.  
  23.  
  24. A number of vulnerabilities were discovered in the Linux kernel that are
  25. corrected with this update:
  26. Multiple vulnerabilities were found by the Sparse source checker that could
  27. allow local users to elevate privileges or gain access to kernel memory
  28. (CAN-2004-0495).
  29. Missing Discretionary Access Controls (DAC) checks in the chown(2) system call
  30. could allow an attacker with a local account to change the group ownership of
  31. arbitrary files, which could lead to root privileges on affected systems
  32. (CAN-2004-0497).
  33. An information leak vulnerability that affects only ia64 systems was fixed
  34. (CAN-2004-0565).
  35. Insecure permissions on /proc/scsi/qla2300/HbaApiNode could allow a local user
  36. to cause a DoS on the system; this only affects Mandrakelinux 9.2 and below
  37. (CAN-2004-0587).
  38. A vulnerability that could crash the kernel has also been fixed. This crash,
  39. however, can only be exploited via root (in br_if.c).
  40. The provided packages are patched to fix these vulnerabilities. All users are
  41. encouraged to upgrade to these updated kernels.
  42. To update your kernel, please follow the directions located at:
  43. http://www.mandrakesoft.com/security/kernelupdate
  44.  
  45.  
  46. Solution : http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:066
  47. Risk factor : High";
  48.  
  49.  
  50.  
  51.  script_description(english:desc["english"]);
  52.  
  53.  summary["english"] = "Check for the version of the kernel package";
  54.  script_summary(english:summary["english"]);
  55.  
  56.  script_category(ACT_GATHER_INFO);
  57.  
  58.  script_copyright(english:"This script is Copyright (C) 2004 Tenable Network Security");
  59.  family["english"] = "Mandrake Local Security Checks";
  60.  script_family(english:family["english"]);
  61.  
  62.  script_dependencies("ssh_get_info.nasl");
  63.  script_require_keys("Host/Mandrake/rpm-list");
  64.  exit(0);
  65. }
  66.  
  67. include("rpm.inc");
  68. if ( rpm_check( reference:"kernel-2.4.25.7mdk-1-1mdk", release:"MDK10.0", yank:"mdk") )
  69. {
  70.  security_hole(0);
  71.  exit(0);
  72. }
  73. if ( rpm_check( reference:"kernel-2.6.3.15mdk-1-1mdk", release:"MDK10.0", yank:"mdk") )
  74. {
  75.  security_hole(0);
  76.  exit(0);
  77. }
  78. if ( rpm_check( reference:"kernel-enterprise-2.4.25.7mdk-1-1mdk", release:"MDK10.0", yank:"mdk") )
  79. {
  80.  security_hole(0);
  81.  exit(0);
  82. }
  83. if ( rpm_check( reference:"kernel-enterprise-2.6.3.15mdk-1-1mdk", release:"MDK10.0", yank:"mdk") )
  84. {
  85.  security_hole(0);
  86.  exit(0);
  87. }
  88. if ( rpm_check( reference:"kernel-secure-2.6.3.15mdk-1-1mdk", release:"MDK10.0", yank:"mdk") )
  89. {
  90.  security_hole(0);
  91.  exit(0);
  92. }
  93. if ( rpm_check( reference:"kernel-smp-2.4.25.7mdk-1-1mdk", release:"MDK10.0", yank:"mdk") )
  94. {
  95.  security_hole(0);
  96.  exit(0);
  97. }
  98. if ( rpm_check( reference:"kernel-smp-2.6.3.15mdk-1-1mdk", release:"MDK10.0", yank:"mdk") )
  99. {
  100.  security_hole(0);
  101.  exit(0);
  102. }
  103. if ( rpm_check( reference:"kernel-source-2.4.25-7mdk", release:"MDK10.0", yank:"mdk") )
  104. {
  105.  security_hole(0);
  106.  exit(0);
  107. }
  108. if ( rpm_check( reference:"kernel-source-2.6.3-15mdk", release:"MDK10.0", yank:"mdk") )
  109. {
  110.  security_hole(0);
  111.  exit(0);
  112. }
  113. if ( rpm_check( reference:"kernel-source-stripped-2.6.3-15mdk", release:"MDK10.0", yank:"mdk") )
  114. {
  115.  security_hole(0);
  116.  exit(0);
  117. }
  118. if ( rpm_check( reference:"kernel-2.4.21.0.32mdk-1-1mdk", release:"MDK9.1", yank:"mdk") )
  119. {
  120.  security_hole(0);
  121.  exit(0);
  122. }
  123. if ( rpm_check( reference:"kernel-secure-2.4.21.0.32mdk-1-1mdk", release:"MDK9.1", yank:"mdk") )
  124. {
  125.  security_hole(0);
  126.  exit(0);
  127. }
  128. if ( rpm_check( reference:"kernel-smp-2.4.21.0.32mdk-1-1mdk", release:"MDK9.1", yank:"mdk") )
  129. {
  130.  security_hole(0);
  131.  exit(0);
  132. }
  133. if ( rpm_check( reference:"kernel-source-2.4.21-0.32mdk", release:"MDK9.1", yank:"mdk") )
  134. {
  135.  security_hole(0);
  136.  exit(0);
  137. }
  138. if ( rpm_check( reference:"kernel-2.4.22.36mdk-1-1mdk", release:"MDK9.2", yank:"mdk") )
  139. {
  140.  security_hole(0);
  141.  exit(0);
  142. }
  143. if ( rpm_check( reference:"kernel-enterprise-2.4.22.36mdk-1-1mdk", release:"MDK9.2", yank:"mdk") )
  144. {
  145.  security_hole(0);
  146.  exit(0);
  147. }
  148. if ( rpm_check( reference:"kernel-secure-2.4.22.36mdk-1-1mdk", release:"MDK9.2", yank:"mdk") )
  149. {
  150.  security_hole(0);
  151.  exit(0);
  152. }
  153. if ( rpm_check( reference:"kernel-smp-2.4.22.36mdk-1-1mdk", release:"MDK9.2", yank:"mdk") )
  154. {
  155.  security_hole(0);
  156.  exit(0);
  157. }
  158. if ( rpm_check( reference:"kernel-source-2.4.22-36mdk", release:"MDK9.2", yank:"mdk") )
  159. {
  160.  security_hole(0);
  161.  exit(0);
  162. }
  163. if (rpm_exists(rpm:"kernel-", release:"MDK10.0")
  164.  || rpm_exists(rpm:"kernel-", release:"MDK9.1")
  165.  || rpm_exists(rpm:"kernel-", release:"MDK9.2") )
  166. {
  167.  set_kb_item(name:"CAN-2004-0495", value:TRUE);
  168.  set_kb_item(name:"CAN-2004-0497", value:TRUE);
  169.  set_kb_item(name:"CAN-2004-0565", value:TRUE);
  170.  set_kb_item(name:"CAN-2004-0587", value:TRUE);
  171. }
  172.