home *** CD-ROM | disk | FTP | other *** search
/ Chip 2007 January, February, March & April / Chip-Cover-CD-2007-02.iso / Pakiet bezpieczenstwa / mini Pentoo LiveCD 2006.1 / mpentoo-2006.1.iso / modules / nessus-2.2.8.mo / usr / lib / nessus / plugins / mandrake_MDKSA-2004-087.nasl < prev    next >
Text File  |  2005-01-14  |  4KB  |  159 lines

  1. #
  2. # (C) Tenable Network Security
  3. #
  4. # This plugin text was extracted from Mandrake Linux Security Advisory MDKSA-2004:087
  5. #
  6.  
  7.  
  8. if ( ! defined_func("bn_random") ) exit(0);
  9. if(description)
  10. {
  11.  script_id(14387);
  12.  script_bugtraq_id(10852);
  13.  script_version ("$Revision: 1.3 $");
  14.  script_cve_id("CAN-2004-0415");
  15.  
  16.  name["english"] = "MDKSA-2004:087: kernel";
  17.  
  18.  script_name(english:name["english"]);
  19.  
  20.  desc["english"] = "
  21. The remote host is missing the patch for the advisory MDKSA-2004:087 (kernel).
  22.  
  23.  
  24. A race condition was discovered in the 64bit file offset handling by Paul
  25. Starzetz from iSEC. The file offset pointer (f_pos) is changed during reading,
  26. writing, and seeking through a file in order to point to the current position of
  27. a file. The value conversion between both the 32bit and 64bit API in the kernel,
  28. as well as access to the f_pos pointer, is defective. As a result, a local
  29. attacker can abuse this vulnerability to gain access to uninitialized kernel
  30. memory, mostly via entries in the /proc filesystem. This kernel memory can
  31. possibly contain information like the root password, and other sensitive data.
  32. The updated kernel packages provided are patched to protect against this
  33. vulnerability, and all users are encouraged to upgrade immediately.
  34.  
  35.  
  36. Solution : http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:087
  37. Risk factor : High";
  38.  
  39.  
  40.  
  41.  script_description(english:desc["english"]);
  42.  
  43.  summary["english"] = "Check for the version of the kernel package";
  44.  script_summary(english:summary["english"]);
  45.  
  46.  script_category(ACT_GATHER_INFO);
  47.  
  48.  script_copyright(english:"This script is Copyright (C) 2004 Tenable Network Security");
  49.  family["english"] = "Mandrake Local Security Checks";
  50.  script_family(english:family["english"]);
  51.  
  52.  script_dependencies("ssh_get_info.nasl");
  53.  script_require_keys("Host/Mandrake/rpm-list");
  54.  exit(0);
  55. }
  56.  
  57. include("rpm.inc");
  58. if ( rpm_check( reference:"kernel-2.4.25.8mdk-1-1mdk", release:"MDK10.0", yank:"mdk") )
  59. {
  60.  security_hole(0);
  61.  exit(0);
  62. }
  63. if ( rpm_check( reference:"kernel-2.6.3.16mdk-1-1mdk", release:"MDK10.0", yank:"mdk") )
  64. {
  65.  security_hole(0);
  66.  exit(0);
  67. }
  68. if ( rpm_check( reference:"kernel-enterprise-2.4.25.8mdk-1-1mdk", release:"MDK10.0", yank:"mdk") )
  69. {
  70.  security_hole(0);
  71.  exit(0);
  72. }
  73. if ( rpm_check( reference:"kernel-enterprise-2.6.3.16mdk-1-1mdk", release:"MDK10.0", yank:"mdk") )
  74. {
  75.  security_hole(0);
  76.  exit(0);
  77. }
  78. if ( rpm_check( reference:"kernel-secure-2.6.3.16mdk-1-1mdk", release:"MDK10.0", yank:"mdk") )
  79. {
  80.  security_hole(0);
  81.  exit(0);
  82. }
  83. if ( rpm_check( reference:"kernel-smp-2.4.25.8mdk-1-1mdk", release:"MDK10.0", yank:"mdk") )
  84. {
  85.  security_hole(0);
  86.  exit(0);
  87. }
  88. if ( rpm_check( reference:"kernel-smp-2.6.3.16mdk-1-1mdk", release:"MDK10.0", yank:"mdk") )
  89. {
  90.  security_hole(0);
  91.  exit(0);
  92. }
  93. if ( rpm_check( reference:"kernel-source-2.4.25-8mdk", release:"MDK10.0", yank:"mdk") )
  94. {
  95.  security_hole(0);
  96.  exit(0);
  97. }
  98. if ( rpm_check( reference:"kernel-source-2.6.3-16mdk", release:"MDK10.0", yank:"mdk") )
  99. {
  100.  security_hole(0);
  101.  exit(0);
  102. }
  103. if ( rpm_check( reference:"kernel-source-stripped-2.6.3-16mdk", release:"MDK10.0", yank:"mdk") )
  104. {
  105.  security_hole(0);
  106.  exit(0);
  107. }
  108. if ( rpm_check( reference:"kernel-2.4.21.0.33mdk-1-1mdk", release:"MDK9.1", yank:"mdk") )
  109. {
  110.  security_hole(0);
  111.  exit(0);
  112. }
  113. if ( rpm_check( reference:"kernel-secure-2.4.21.0.33mdk-1-1mdk", release:"MDK9.1", yank:"mdk") )
  114. {
  115.  security_hole(0);
  116.  exit(0);
  117. }
  118. if ( rpm_check( reference:"kernel-smp-2.4.21.0.33mdk-1-1mdk", release:"MDK9.1", yank:"mdk") )
  119. {
  120.  security_hole(0);
  121.  exit(0);
  122. }
  123. if ( rpm_check( reference:"kernel-source-2.4.21-0.33mdk", release:"MDK9.1", yank:"mdk") )
  124. {
  125.  security_hole(0);
  126.  exit(0);
  127. }
  128. if ( rpm_check( reference:"kernel-2.4.22.37mdk-1-1mdk", release:"MDK9.2", yank:"mdk") )
  129. {
  130.  security_hole(0);
  131.  exit(0);
  132. }
  133. if ( rpm_check( reference:"kernel-enterprise-2.4.22.37mdk-1-1mdk", release:"MDK9.2", yank:"mdk") )
  134. {
  135.  security_hole(0);
  136.  exit(0);
  137. }
  138. if ( rpm_check( reference:"kernel-secure-2.4.22.37mdk-1-1mdk", release:"MDK9.2", yank:"mdk") )
  139. {
  140.  security_hole(0);
  141.  exit(0);
  142. }
  143. if ( rpm_check( reference:"kernel-smp-2.4.22.37mdk-1-1mdk", release:"MDK9.2", yank:"mdk") )
  144. {
  145.  security_hole(0);
  146.  exit(0);
  147. }
  148. if ( rpm_check( reference:"kernel-source-2.4.22-37mdk", release:"MDK9.2", yank:"mdk") )
  149. {
  150.  security_hole(0);
  151.  exit(0);
  152. }
  153. if (rpm_exists(rpm:"kernel-", release:"MDK10.0")
  154.  || rpm_exists(rpm:"kernel-", release:"MDK9.1")
  155.  || rpm_exists(rpm:"kernel-", release:"MDK9.2") )
  156. {
  157.  set_kb_item(name:"CAN-2004-0415", value:TRUE);
  158. }
  159.