Executive Summary
Summary | |
---|---|
Title | New Linux 2.4.17 packages fix several problems (ia64) |
Informations | |||
---|---|---|---|
Name | DSA-423 | First vendor Publication | 2004-01-15 |
Vendor | Debian | Last vendor Modification | 2004-01-15 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The IA-64 maintainers fixed several security related bugs in the Linux kernel 2.4.17 used for the IA-64 architecture, mostly by backporting fixes from 2.4.18. The corrections are listed below with the identification from the Common Vulnerabilities and Exposures (CVE) project: CAN-2003-0001: Multiple ethernet network interface card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak. CAN-2003-0018: Linux kernel 2.4.10 through 2.4.21-pre4 does not properly handle the O_DIRECT feature, which allows local attackers with write privileges to read portions of previously deleted files, or cause file system corruption. CAN-2003-0127: The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process which is spawned by the kernel. CAN-2003-0461: The virtual file /proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords. CAN-2003-0462: A race condition in the way env_start and env_end pointers are initialized in the execve system call and used in fs/proc/base.c on Linux 2.4 allows local users to cause a denial of service (crash). CAN-2003-0476: The execve system call in Linux 2.4.x records the file descriptor of the executable process in the file table of the calling process, which allows local users to gain read access to restricted file descriptors. CAN-2003-0501: The /proc filesystem in Linux allows local users to obtain sensitive information by opening various entries in /proc/self before executing a setuid program, which causes the program to fail to change the ownership and permissions of those entries. CAN-2003-0550: The STP protocol, as enabled in Linux 2.4.x, does not provide sufficient security by design, which allows attackers to modify the bridge topology. CAN-2003-0551: The STP protocol implementation in Linux 2.4.x does not properly verify certain lengths, which could allow attackers to cause a denial of service. CAN-2003-0552: Linux 2.4.x allows remote attackers to spoof the bridge Forwarding table via forged packets whose source addresses are the same as the target. CAN-2003-0961: An integer overflow in brk system call (do_brk function) for Linux kernel 2.4.22 and earlier allows local users to gain root privileges. CAN-2003-0985: The mremap system call (do_mremap) in Linux kernel 2.4 and 2.6 does not properly perform boundary checks, which allows local users to cause a denial of service and possibly gain privileges by causing a remapping of a virtual memory area (VMA) to create a zero length VMA. For the stable distribution (woody) this problem has been fixed in version kernel-image-2.4.17-ia64 for the ia64 architecture. Other architectures are already or will be fixed separately. For the unstable distribution (sid) this problem will be fixed soon with newly uploaded packages. |
Original Source
Url : http://www.debian.org/security/2004/dsa-423 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-200 | Information Exposure |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10189 | |||
Oval ID: | oval:org.mitre.oval:def:10189 | ||
Title: | The mremap system call (do_mremap) in Linux kernel 2.4.x before 2.4.21, and possibly other versions before 2.4.24, does not properly perform bounds checks, which allows local users to cause a denial of service and possibly gain privileges by causing a remapping of a virtual memory area (VMA) to create a zero length VMA, a different vulnerability than CAN-2004-0077. | ||
Description: | The mremap system call (do_mremap) in Linux kernel 2.4.x before 2.4.21, and possibly other versions before 2.4.24, does not properly perform bounds checks, which allows local users to cause a denial of service and possibly gain privileges by causing a remapping of a virtual memory area (VMA) to create a zero length VMA, a different vulnerability than CAN-2004-0077. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0985 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:254 | |||
Oval ID: | oval:org.mitre.oval:def:254 | ||
Title: | Linux Kernel ptrace Privilege Escalation Vulnerability | ||
Description: | The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0127 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | Linux kernel |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:2665 | |||
Oval ID: | oval:org.mitre.oval:def:2665 | ||
Title: | Data Leak in NIC | ||
Description: | Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0001 | Version: | 1 |
Platform(s): | Sun Solaris 7 | Product(s): | Sun Am7990 Ethernet Driver |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28706 | |||
Oval ID: | oval:org.mitre.oval:def:28706 | ||
Title: | Critical Patch Update January 2015 | ||
Description: | Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0001 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:304 | |||
Oval ID: | oval:org.mitre.oval:def:304 | ||
Title: | Red Hat Linux Kernel Serial Link Information Disclosure Vulnerability | ||
Description: | /proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0461 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:309 | |||
Oval ID: | oval:org.mitre.oval:def:309 | ||
Title: | Linux Kernel execve Race Condition Vulnerability | ||
Description: | A race condition in the way env_start and env_end pointers are initialized in the execve system call and used in fs/proc/base.c on Linux 2.4 allows local users to cause a denial of service (crash). | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0462 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | Linux kernel |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:327 | |||
Oval ID: | oval:org.mitre.oval:def:327 | ||
Title: | Linux Kernel execve Read Access to Restricted File Descriptors | ||
Description: | The execve system call in Linux 2.4.x records the file descriptor of the executable process in the file table of the calling process, which allows local users to gain read access to restricted file descriptors. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0476 | Version: | 4 |
Platform(s): | Red Hat Linux 9 | Product(s): | Linux kernel |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:328 | |||
Oval ID: | oval:org.mitre.oval:def:328 | ||
Title: | Linux Kernel /proc/self setuid Vulnerability | ||
Description: | The /proc filesystem in Linux allows local users to obtain sensitive information by opening various entries in /proc/self before executing a setuid program, which causes the program to fail to change the ownership and permissions of those entries. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0501 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | Linux kernel |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:380 | |||
Oval ID: | oval:org.mitre.oval:def:380 | ||
Title: | Insecure Design of the STP Protocol | ||
Description: | The STP protocol, as enabled in Linux 2.4.x, does not provide sufficient security by design, which allows attackers to modify the bridge topology. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0550 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | Linux kernel |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:384 | |||
Oval ID: | oval:org.mitre.oval:def:384 | ||
Title: | STP Protocol Length Verification Vulnerability | ||
Description: | The STP protocol implementation in Linux 2.4.x does not properly verify certain lengths, which could allow attackers to cause a denial of service. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0551 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | Linux kernel |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:385 | |||
Oval ID: | oval:org.mitre.oval:def:385 | ||
Title: | Linux Kernel Bridge Forwarding Table Spoof Vulnerability | ||
Description: | Linux 2.4.x allows remote attackers to spoof the bridge Forwarding table via forged packets whose source addresses are the same as the target. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0552 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | Linux kernel |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:860 | |||
Oval ID: | oval:org.mitre.oval:def:860 | ||
Title: | Red Hat Linux Kernel do_mremap Denial of Service Vulnerability | ||
Description: | The mremap system call (do_mremap) in Linux kernel 2.4.x before 2.4.21, and possibly other versions before 2.4.24, does not properly perform bounds checks, which allows local users to cause a denial of service and possibly gain privileges by causing a remapping of a virtual memory area (VMA) to create a zero length VMA, a different vulnerability than CAN-2004-0077. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0985 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | Linux kernel |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:867 | |||
Oval ID: | oval:org.mitre.oval:def:867 | ||
Title: | Red Hat Enterprise 3 Linux Kernel do_mremap Denial of Service Vulnerability | ||
Description: | The mremap system call (do_mremap) in Linux kernel 2.4.x before 2.4.21, and possibly other versions before 2.4.24, does not properly perform bounds checks, which allows local users to cause a denial of service and possibly gain privileges by causing a remapping of a virtual memory area (VMA) to create a zero length VMA, a different vulnerability than CAN-2004-0077. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0985 | Version: | 2 |
Platform(s): | Red Hat Enterprise Linux 3 | Product(s): | Linux kernel |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:9330 | |||
Oval ID: | oval:org.mitre.oval:def:9330 | ||
Title: | /proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords. | ||
Description: | /proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0461 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:997 | |||
Oval ID: | oval:org.mitre.oval:def:997 | ||
Title: | Red Hat Enterprise Linux 3 Kernel Serial Link Information Disclosure Vulnerability | ||
Description: | /proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0461 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 3 | Product(s): | |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
SAINT Exploits
Description | Link |
---|---|
Linux kernel ptrace privilege elevation vulnerability | More info here |
ExploitDB Exploits
id | Description |
---|---|
2013-06-10 | Cisco ASA < 8.4.4.6|8.2.5.32 Ethernet Information Leak |
2007-03-23 | Linux Kernel 2.0.x/2.2.x/2.4.x,FreeBSD 4.x Network Device Driver Frame Paddin... |
2007-03-23 | Ethernet Device Drivers Frame Padding - Info Leakage Exploit (Etherleak) |
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200312-02 (Kernel) File : nvt/glsa_200312_02.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 423-1 (kernel-image-2.4.17-ia64) File : nvt/deb_423_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 495-1 (kernel) File : nvt/deb_495_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 475-1 (kernel-image-2.4.17-hppa) File : nvt/deb_475_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 470-1 (kernel-image-2.4.17-hppa) File : nvt/deb_470_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 450-1 (kernel-source-2.4.19, kernel-patch-2.4.19... File : nvt/deb_450_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 442-1 (kernel-patch-2.4.17-s390, kernel-image-2.... File : nvt/deb_442_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 440-1 (kernel-source-2.4.17, kernel-patch-2.4.17... File : nvt/deb_440_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 439-1 (kernel) File : nvt/deb_439_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 433-1 (kernel-patch-2.4.17-mips) File : nvt/deb_433_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 427-1 (kernel-patch-2.4.17-mips) File : nvt/deb_427_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1067-1 (kernel 2.4.16) File : nvt/deb_1067_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 417-2 (kernel-image-2.4.18-1-alpha) File : nvt/deb_417_2.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 417-1 (kernel-patch-2.4.18-powerpc, kernel-image... File : nvt/deb_417_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 413-1 (kernel-source-2.4.18, kernel-image-2.4.18... File : nvt/deb_413_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 403-1 (kernel-image-2.4.18-1-alpha, kernel-image... File : nvt/deb_403_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 358-1 (linux-kernel-i386, linux-kernel-alpha) File : nvt/deb_358_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 336-1 (kernel-source-2.2.20, kernel-image-2.2.20... File : nvt/deb_336_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 332-1 (kernel-source-2.4.17, kernel-patch-2.4.17... File : nvt/deb_332_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 312-1 (kernel-patch-2.4.18-powerpc) File : nvt/deb_312_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 311-1 (kernel) File : nvt/deb_311_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 276-1 (kernel-patch-2.4.17-s390, kernel-image-2.... File : nvt/deb_276_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 270-1 (kernel-patch-2.4.17-mips, kernel-patch-2.... File : nvt/deb_270_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1082-1 (kernel-2.4.17) File : nvt/deb_1082_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1070-1 (kernel-source-2.4.19,kernel-image-sparc-... File : nvt/deb_1070_1.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2003-336-01 Kernel security update File : nvt/esoft_slk_ssa_2003_336_01.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2004-006-01 Kernel security update File : nvt/esoft_slk_ssa_2004_006_01.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2004-049-01 Kernel security update File : nvt/esoft_slk_ssa_2004_049_01.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
10298 | Linux Kernel Serial Link Information Disclosure |
10297 | Linux Kernel env_start/env_end Race Condition DoS |
10296 | Linux Kernel execve System Call Arbitrary File Descriptor Read |
10295 | Linux Kernel /proc/self System Information Disclosure |
10294 | Linux Kernel STP Protocol Bridge Topology Modification |
10293 | Linux Kernel STP Protocol Malformed Length DoS |
10292 | Linux Kernel Bridge Forwarding Table Spoofing |
4565 | Linux Kernel ptrace Attached Process Privilege Escalation |
4457 | Linux Kernel O_DIRECT Deleted File Retrieval or File System Corruption |
3873 | Multiple Ethernet Driver Frame Padding Information Disclosure Multiple Ethernet Network Interface Card (NIC) Device Drivers contain flaws that may result in an information leakage vulnerability. The issue is triggered when Ethernet device drivers reuse old frame buffer data to pad packets. It is possible that the flaw may allow that may allow remote attackers to harvest sensitive information from affected devices resulting in a loss of confidentiality. |
3315 | Linux Kernel do_mremap() Privilege Escalation A local overflow exists in the Linux kernel. The do_mremap() function fails to perform bounds checking resulting in a buffer overflow. With a specially crafted request, an attacker can execute arbitrary code resulting in a loss of confidentiality, integrity, and/or availability. |
2887 | Linux Kernel do_brk local Overflow A flaw exists in the Linux kernel which allows a local user to map kernel memory segments into an unprivileged process. Specifically, the do_brk function does not verify that the allocated memory range does not exceed the TASK_SIZE constant. The do_brk function is called by the ELF executable loader and the mmap system call, however only the mmap method is exploitable. Once kernel memory access has been obtained, a number of tricks can be used to gain superuser privileges. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-01-20 | Name : The remote device is affected by a memory disclosure vulnerability. File : juniper_jsa10773.nasl - Type : ACT_GATHER_INFO |
2015-01-23 | Name : The remote Solaris system is missing a security patch from CPU jan2015. File : solaris_jan2015_SRU11_1_11_4_0.nasl - Type : ACT_GATHER_INFO |
2013-09-15 | Name : The remote host is missing Sun Security Patch number 125907-02 File : solaris10_x86_125907.nasl - Type : ACT_GATHER_INFO |
2013-07-16 | Name : The remote device is missing a vendor-supplied security patch. File : juniper_jsa10579.nasl - Type : ACT_GATHER_INFO |
2005-07-13 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2004-006-01.nasl - Type : ACT_GATHER_INFO |
2005-07-13 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2003-336-01.nasl - Type : ACT_GATHER_INFO |
2005-07-13 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2004-008-01.nasl - Type : ACT_GATHER_INFO |
2005-07-13 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2004-049-01.nasl - Type : ACT_GATHER_INFO |
2005-03-18 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHNE_29267.nasl - Type : ACT_GATHER_INFO |
2005-03-18 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHNE_28636.nasl - Type : ACT_GATHER_INFO |
2005-02-16 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHNE_29244.nasl - Type : ACT_GATHER_INFO |
2005-02-16 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHNE_28143.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-417.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-311.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-312.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-332.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-270.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-336.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-276.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-358.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-403.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-495.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-470.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-413.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-423.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-427.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-433.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-439.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-442.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-475.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-450.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-440.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2003-014.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2004-001.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2003-110.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2003-074.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2003-066.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2003-039.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2003-038.nasl - Type : ACT_GATHER_INFO |
2004-07-25 | Name : The remote host is missing a vendor-supplied security patch File : suse_SA_2003_021.nasl - Type : ACT_GATHER_INFO |
2004-07-25 | Name : The remote host is missing a vendor-supplied security patch File : suse_SA_2003_049.nasl - Type : ACT_GATHER_INFO |
2004-07-23 | Name : The remote Fedora Core host is missing a security update. File : fedora_2003-046.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2002-263.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2003-103.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2003-239.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2003-389.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2003-408.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2003-416.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2003-419.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2004-188.nasl - Type : ACT_GATHER_INFO |
2003-01-14 | Name : The remote host appears to leak memory in network packets. File : etherleak.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:33:01 |
|
2013-05-11 12:18:25 |
|