Executive Summary

Summary
Title Updated kernel packages fix security vulnerabilities
Informations
Name RHSA-2004:183 First vendor Publication 2004-04-22
Vendor RedHat Last vendor Modification 2004-04-22
Severity (Vendor) N/A Revision 01

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.2 Attack Range Local
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Problem Description:

Original Source

Url : https://rhn.redhat.com/errata/RHSA-2004-183.html

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:10733
 
Oval ID: oval:org.mitre.oval:def:10733
Title: Buffer overflow in the ISO9660 file system component for Linux kernel 2.4.x, 2.5.x and 2.6.x, allows local users with physical access to overflow kernel memory and execute arbitrary code via a malformed CD containing a long symbolic link entry.
Description: Buffer overflow in the ISO9660 file system component for Linux kernel 2.4.x, 2.5.x and 2.6.x, allows local users with physical access to overflow kernel memory and execute arbitrary code via a malformed CD containing a long symbolic link entry.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0109
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:11214
 
Oval ID: oval:org.mitre.oval:def:11214
Title: Integer overflow in the ip_setsockopt function in Linux kernel 2.4.22 through 2.4.25 and 2.6.1 through 2.6.3 allows local users to cause a denial of service (crash) or execute arbitrary code via the MCAST_MSFILTER socket option.
Description: Integer overflow in the ip_setsockopt function in Linux kernel 2.4.22 through 2.4.25 and 2.6.1 through 2.6.3 allows local users to cause a denial of service (crash) or execute arbitrary code via the MCAST_MSFILTER socket option.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0424
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:939
 
Oval ID: oval:org.mitre.oval:def:939
Title: Linux Kernel ip_setsockopt Integer Overflow
Description: Integer overflow in the ip_setsockopt function in Linux kernel 2.4.22 through 2.4.25 and 2.6.1 through 2.6.3 allows local users to cause a denial of service (crash) or execute arbitrary code via the MCAST_MSFILTER socket option.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0424
Version: 2
Platform(s): Red Hat Enterprise Linux 3
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:940
 
Oval ID: oval:org.mitre.oval:def:940
Title: Linux Kernel ISO9660 File System Component BO
Description: Buffer overflow in the ISO9660 file system component for Linux kernel 2.4.x, 2.5.x and 2.6.x, allows local users with physical access to overflow kernel memory and execute arbitrary code via a malformed CD containing a long symbolic link entry.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0109
Version: 2
Platform(s): Red Hat Enterprise Linux 3
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Os 15
Os 2

OpenVAS Exploits

Date Description
2008-09-24 Name : Gentoo Security Advisory GLSA 200407-02 (Kernel)
File : nvt/glsa_200407_02.nasl
2008-01-17 Name : Debian Security Advisory DSA 479-1 (kernel)
File : nvt/deb_479_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 479-2 (kernel-image-2.4.18-1-i386)
File : nvt/deb_479_2.nasl
2008-01-17 Name : Debian Security Advisory DSA 480-1 (kernel-image-2.4.17-hppa kernel-image-2.4...
File : nvt/deb_480_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 481-1 (kernel-image-2.4.17-ia64)
File : nvt/deb_481_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 482-1 (kernel)
File : nvt/deb_482_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 489-1 (kernel-source-2.4.17 kernel-patch-2.4.17-...
File : nvt/deb_489_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 491-1 (kernel-source-2.4.19 kernel-patch-2.4.19-...
File : nvt/deb_491_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 495-1 (kernel)
File : nvt/deb_495_1.nasl
0000-00-00 Name : Slackware Advisory SSA:2004-119-01 kernel security updates
File : nvt/esoft_slk_ssa_2004_119_01.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
5547 Linux Kernel ip_setsockopt MCAST_MSFILTER macro Overflow

Linux kernel contains a flaw that may allow a local denial of service. The issue is triggered when handling the MCAST_MSFILTER socket option of the ip_setsockopt() in the net/ipv4/i_sockglue.c source file. This flaw may allow a local attacker to cause a interger overflow and crash server or execute arbitrary codes, result in loss of availability.
5362 Linux Kernel ISO9660 Symbolic Link Overflow Privilege Escalation

A local overflow exists in the Linux kernel. The kernel fails to validate symbolic links on ISO 9660 filesystems resulting in a buffer overflow. With a specially crafted symbolic link on a mounted ISO9660 filesystem, an attacker can cause execution of code with kernel privileges resulting in a loss of confidentiality, integrity, and/or availability.

Nessus® Vulnerability Scanner

Date Description
2005-07-13 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2004-119-01.nasl - Type : ACT_GATHER_INFO
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-479.nasl - Type : ACT_GATHER_INFO
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-480.nasl - Type : ACT_GATHER_INFO
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-481.nasl - Type : ACT_GATHER_INFO
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-482.nasl - Type : ACT_GATHER_INFO
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-489.nasl - Type : ACT_GATHER_INFO
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-491.nasl - Type : ACT_GATHER_INFO
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-495.nasl - Type : ACT_GATHER_INFO
2004-08-30 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200407-02.nasl - Type : ACT_GATHER_INFO
2004-07-31 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2004-029.nasl - Type : ACT_GATHER_INFO
2004-07-31 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2004-037.nasl - Type : ACT_GATHER_INFO
2004-07-25 Name : The remote host is missing a vendor-supplied security patch
File : suse_SA_2004_010.nasl - Type : ACT_GATHER_INFO
2004-07-25 Name : The remote host is missing a vendor-supplied security patch
File : suse_SA_2004_009.nasl - Type : ACT_GATHER_INFO
2004-07-23 Name : The remote Fedora Core host is missing a security update.
File : fedora_2004-111.nasl - Type : ACT_GATHER_INFO
2004-07-23 Name : The remote Fedora Core host is missing a security update.
File : fedora_2004-101.nasl - Type : ACT_GATHER_INFO
2004-07-06 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2004-105.nasl - Type : ACT_GATHER_INFO
2004-07-06 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2004-183.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:48:29
  • Multiple Updates