Executive Summary

Summary
Title Linux kernel vulnerability
Informations
Name USN-319-1 First vendor Publication 2006-07-18
Vendor Ubuntu Last vendor Modification 2006-07-18
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:H/Au:N/C:C/I:C/A:C)
Cvss Base Score 6.2 Attack Range Local
Cvss Impact Score 10 Attack Complexity High
Cvss Expoit Score 1.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the following package versions:

Ubuntu 6.06 LTS:
linux-image-2.6.15-26-386 2.6.15-26.45
linux-image-2.6.15-26-686 2.6.15-26.45
linux-image-2.6.15-26-amd64-generic 2.6.15-26.45
linux-image-2.6.15-26-amd64-k8 2.6.15-26.45
linux-image-2.6.15-26-amd64-server 2.6.15-26.45
linux-image-2.6.15-26-amd64-xeon 2.6.15-26.45
linux-image-2.6.15-26-hppa32 2.6.15-26.45
linux-image-2.6.15-26-hppa32-smp 2.6.15-26.45
linux-image-2.6.15-26-hppa64 2.6.15-26.45
linux-image-2.6.15-26-hppa64-smp 2.6.15-26.45
linux-image-2.6.15-26-itanium 2.6.15-26.45
linux-image-2.6.15-26-itanium-smp 2.6.15-26.45
linux-image-2.6.15-26-k7 2.6.15-26.45
linux-image-2.6.15-26-mckinley 2.6.15-26.45
linux-image-2.6.15-26-mckinley-smp 2.6.15-26.45
linux-image-2.6.15-26-powerpc 2.6.15-26.45
linux-image-2.6.15-26-powerpc-smp 2.6.15-26.45
linux-image-2.6.15-26-powerpc64-smp 2.6.15-26.45
linux-image-2.6.15-26-server 2.6.15-26.45
linux-image-2.6.15-26-server-bigiron 2.6.15-26.45
linux-image-2.6.15-26-sparc64 2.6.15-26.45
linux-image-2.6.15-26-sparc64-smp 2.6.15-26.45

After a standard system upgrade you need to reboot your computer to effect the necessary changes.

This flaw affects Ubuntu 5.04 and Ubuntu 5.10 as well; these releases will be fixed shortly in a followup advisory.

Details follow:

A race condition has been discovered in the file permission handling of the /proc file system. A local attacker could exploit this to execute arbitrary code with full root privileges.

Original Source

Url : http://www.ubuntu.com/usn/USN-319-1

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:10060
 
Oval ID: oval:org.mitre.oval:def:10060
Title: Race condition in Linux kernel 2.6.17.4 and earlier allows local users to gain root privileges by using prctl with PR_SET_DUMPABLE in a way that causes /proc/self/environ to become setuid root.
Description: Race condition in Linux kernel 2.6.17.4 and earlier allows local users to gain root privileges by using prctl with PR_SET_DUMPABLE in a way that causes /proc/self/environ to become setuid root.
Family: unix Class: vulnerability
Reference(s): CVE-2006-3626
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 42

OpenVAS Exploits

Date Description
2009-10-10 Name : SLES9: Security update for Linux kernel
File : nvt/sles9p5020521.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
27120 Linux Kernel /proc/self/environ prctl Race Condition Local Privilege Escalation

Linux kernel contains a flaw that may allow local users to gain root privileges by using prctl with PR_SET_DUMPABLE in a way that causes /proc/self/environ to become setuid root. The issue is triggered by a race condition occurs in '/proc' when changing file status. This flaw may lead to a loss of integrity.

Nessus® Vulnerability Scanner

Date Description
2013-07-12 Name : The remote Oracle Linux host is missing a security update.
File : oraclelinux_ELSA-2006-0617.nasl - Type : ACT_GATHER_INFO
2012-05-17 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_kernel-1900.nasl - Type : ACT_GATHER_INFO
2007-12-13 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_kernel-1896.nasl - Type : ACT_GATHER_INFO
2007-11-10 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-319-1.nasl - Type : ACT_GATHER_INFO
2007-11-10 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-319-2.nasl - Type : ACT_GATHER_INFO
2006-12-16 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2006-124.nasl - Type : ACT_GATHER_INFO
2006-10-14 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1111.nasl - Type : ACT_GATHER_INFO
2006-08-30 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2006-0617.nasl - Type : ACT_GATHER_INFO
2006-08-23 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2006-0617.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 12:03:38
  • Multiple Updates