Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2015-01128

Опубликовано: 01 янв. 2015
Источник: fstec
CVSS2: 7.8
EPSS Низкий

Описание

Множественные уязвимости пакета linux-patch-debian-2.6.26 операционной системы Debian GNU/Linux, эксплуатация которых может привести к нарушению доступности защищаемой информации. Эксплуатация уязвимостей может быть осуществлена удаленно.

Вендор

Сообщество свободного программного обеспечения

Наименование ПО

Debian GNU/Linux

Версия ПО

до 5 (Debian GNU/Linux)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 7,8)

Возможные меры по устранению уязвимости

Проблема может быть решена обновлением операционной системы до следующих версий пакетов в зависимости от архитектуры:
Debian GNU/Linux 5:
ppc:
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-image-2.6.26-2-vserver-powerpc - 2.6.26-22lenny1
linux-headers-2.6.26-2-powerpc - 2.6.26-22lenny1
linux-headers-2.6.26-2-powerpc-smp - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-powerpc - 2.6.26-22lenny1
linux-image-2.6.26-2-powerpc64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
linux-image-2.6.26-2-vserver-powerpc64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-vserver-powerpc - 2.6.26-22lenny1
linux-libc-dev - 2.6.26-22lenny1
linux-headers-2.6.26-2-common-vserver - 2.6.26-22lenny1
linux-headers-2.6.26-2-powerpc64 - 2.6.26-22lenny1
linux-image-2.6.26-2-powerpc - 2.6.26-22lenny1
linux-headers-2.6.26-2-vserver-powerpc64 - 2.6.26-22lenny1
linux-image-2.6.26-2-powerpc-smp - 2.6.26-22lenny1
s390x:
linux-libc-dev - 2.6.26-22lenny1
linux-headers-2.6.26-2-vserver-s390x - 2.6.26-22lenny1
linux-headers-2.6.26-2-s390 - 2.6.26-22lenny1
linux-headers-2.6.26-2-s390x - 2.6.26-22lenny1
linux-image-2.6.26-2-s390x - 2.6.26-22lenny1
linux-image-2.6.26-2-s390-tape - 2.6.26-22lenny1
linux-headers-2.6.26-2-common-vserver - 2.6.26-22lenny1
linux-image-2.6.26-2-s390 - 2.6.26-22lenny1
linux-image-2.6.26-2-vserver-s390x - 2.6.26-22lenny1
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-s390 - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
i686:
linux-headers-2.6.26-2-amd64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-i386 - 2.6.26-22lenny1
linux-headers-2.6.26-2-xen-686 - 2.6.26-22lenny1
linux-headers-2.6.26-2-vserver-686 - 2.6.26-22lenny1
linux-headers-2.6.26-2-486 - 2.6.26-22lenny1
xen-linux-system-2.6.26-2-xen-686 - 2.6.26-22lenny1
linux-image-2.6.26-2-vserver-686-bigmem - 2.6.26-22lenny1
linux-image-2.6.26-2-686-bigmem - 2.6.26-22lenny1
linux-libc-dev - 2.6.26-22lenny1
linux-headers-2.6.26-2-common-openvz - 2.6.26-22lenny1
linux-image-2.6.26-2-vserver-686 - 2.6.26-22lenny1
linux-image-2.6.26-2-openvz-686 - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
linux-modules-2.6.26-2-xen-686 - 2.6.26-22lenny1
linux-image-2.6.26-2-686 - 2.6.26-22lenny1
linux-image-2.6.26-2-xen-686 - 2.6.26-22lenny1
linux-headers-2.6.26-2-openvz-686 - 2.6.26-22lenny1
linux-headers-2.6.26-2-686-bigmem - 2.6.26-22lenny1
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-headers-2.6.26-2-686 - 2.6.26-22lenny1
linux-headers-2.6.26-2-common-xen - 2.6.26-22lenny1
linux-image-2.6.26-2-486 - 2.6.26-22lenny1
linux-image-2.6.26-2-amd64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-common-vserver - 2.6.26-22lenny1
linux-headers-2.6.26-2-vserver-686-bigmem - 2.6.26-22lenny1
hppa:
linux-headers-2.6.26-2-parisc-smp - 2.6.26-22lenny1
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
linux-libc-dev - 2.6.26-22lenny1
linux-headers-2.6.26-2-parisc64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-hppa - 2.6.26-22lenny1
linux-headers-2.6.26-2-parisc - 2.6.26-22lenny1
linux-image-2.6.26-2-parisc64 - 2.6.26-22lenny1
linux-image-2.6.26-2-parisc64-smp - 2.6.26-22lenny1
linux-image-2.6.26-2-parisc - 2.6.26-22lenny1
linux-image-2.6.26-2-parisc-smp - 2.6.26-22lenny1
linux-headers-2.6.26-2-parisc64-smp - 2.6.26-22lenny1
sparc:
linux-image-2.6.26-2-sparc64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-vserver-sparc64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-sparc - 2.6.26-22lenny1
linux-image-2.6.26-2-vserver-sparc64 - 2.6.26-22lenny1
linux-image-2.6.26-2-sparc64-smp - 2.6.26-22lenny1
linux-libc-dev - 2.6.26-22lenny1
linux-headers-2.6.26-2-common-vserver - 2.6.26-22lenny1
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
linux-headers-2.6.26-2-sparc64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-sparc64-smp - 2.6.26-22lenny1
x86-64:
linux-headers-2.6.26-2-amd64 - 2.6.26-22lenny1
linux-image-2.6.26-2-xen-amd64 - 2.6.26-22lenny1
linux-libc-dev - 2.6.26-22lenny1
linux-headers-2.6.26-2-vserver-amd64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-xen-amd64 - 2.6.26-22lenny1
linux-image-2.6.26-2-vserver-amd64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-common-vserver - 2.6.26-22lenny1
xen-linux-system-2.6.26-2-xen-amd64 - 2.6.26-22lenny1
linux-modules-2.6.26-2-xen-amd64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-amd64 - 2.6.26-22lenny1
linux-image-2.6.26-2-openvz-amd64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
linux-headers-2.6.26-2-common-openvz - 2.6.26-22lenny1
linux-headers-2.6.26-2-common-xen - 2.6.26-22lenny1
linux-image-2.6.26-2-amd64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-headers-2.6.26-2-openvz-amd64 - 2.6.26-22lenny1
armel:
linux-headers-2.6.26-2-orion5x - 2.6.26-22lenny1
linux-headers-2.6.26-2-ixp4xx - 2.6.26-22lenny1
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-image-2.6.26-2-ixp4xx - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-armel - 2.6.26-22lenny1
linux-image-2.6.26-2-orion5x - 2.6.26-22lenny1
linux-headers-2.6.26-2-versatile - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
linux-image-2.6.26-2-iop32x - 2.6.26-22lenny1
linux-libc-dev - 2.6.26-22lenny1
linux-image-2.6.26-2-versatile - 2.6.26-22lenny1
linux-headers-2.6.26-2-iop32x - 2.6.26-22lenny1
alpha:
linux-headers-2.6.26-2-alpha-smp - 2.6.26-22lenny1
linux-headers-2.6.26-2-alpha-generic - 2.6.26-22lenny1
linux-image-2.6.26-2-alpha-generic - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
linux-image-2.6.26-2-alpha-smp - 2.6.26-22lenny1
linux-headers-2.6.26-2-alpha-legacy - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-alpha - 2.6.26-22lenny1
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-libc-dev - 2.6.26-22lenny1
linux-image-2.6.26-2-alpha-legacy - 2.6.26-22lenny1
ia64:
linux-headers-2.6.26-2-itanium - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
linux-headers-2.6.26-2-mckinley - 2.6.26-22lenny1
linux-image-2.6.26-2-vserver-mckinley - 2.6.26-22lenny1
linux-libc-dev - 2.6.26-22lenny1
linux-headers-2.6.26-2-common-vserver - 2.6.26-22lenny1
linux-headers-2.6.26-2-vserver-mckinley - 2.6.26-22lenny1
linux-image-2.6.26-2-vserver-itanium - 2.6.26-22lenny1
linux-image-2.6.26-2-mckinley - 2.6.26-22lenny1
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-image-2.6.26-2-itanium - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-ia64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-vserver-itanium - 2.6.26-22lenny1
mips:
linux-headers-2.6.26-2-r4k-ip22 - 2.6.26-22lenny1
linux-image-2.6.26-2-5kc-malta - 2.6.26-22lenny1
linux-headers-2.6.26-2-5kc-malta - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
linux-headers-2.6.26-2-sb1a-bcm91480b - 2.6.26-22lenny1
linux-headers-2.6.26-2-4kc-malta - 2.6.26-22lenny1
linux-headers-2.6.26-2-r5k-ip32 - 2.6.26-22lenny1
linux-headers-2.6.26-2-sb1-bcm91250a - 2.6.26-22lenny1
linux-libc-dev - 2.6.26-22lenny1
linux-image-2.6.26-2-4kc-malta - 2.6.26-22lenny1
linux-image-2.6.26-2-sb1-bcm91250a - 2.6.26-22lenny1
linux-image-2.6.26-2-sb1a-bcm91480b - 2.6.26-22lenny1
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-mips - 2.6.26-22lenny1
linux-image-2.6.26-2-r4k-ip22 - 2.6.26-22lenny1
linux-image-2.6.26-2-r5k-ip32 - 2.6.26-22lenny1
noarch:
linux-support-2.6.26-2 - 2.6.26-22lenny1
linux-manual-2.6.26 - 2.6.26-22lenny1
linux-patch-debian-2.6.26 - 2.6.26-22lenny1
linux-source-2.6.26 - 2.6.26-22lenny1
linux-doc-2.6.26 - 2.6.26-22lenny1
linux-tree-2.6.26 - 2.6.26-22lenny1
mipsel:
linux-image-2.6.26-2-sb1-bcm91250a - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-mipsel - 2.6.26-22lenny1
linux-image-2.6.26-2-sb1a-bcm91480b - 2.6.26-22lenny1
linux-libc-dev - 2.6.26-22lenny1
linux-headers-2.6.26-2-r5k-cobalt - 2.6.26-22lenny1
linux-headers-2.6.26-2-4kc-malta - 2.6.26-22lenny1
linux-image-2.6.26-2-4kc-malta - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
linux-headers-2.6.26-2-sb1-bcm91250a - 2.6.26-22lenny1
linux-headers-2.6.26-2-sb1a-bcm91480b - 2.6.26-22lenny1
linux-image-2.6.26-2-5kc-malta - 2.6.26-22lenny1
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-image-2.6.26-2-r5k-cobalt - 2.6.26-22lenny1
linux-headers-2.6.26-2-5kc-malta - 2.6.26-22lenny1
arm:
linux-image-2.6.26-2-iop32x - 2.6.26-22lenny1
linux-headers-2.6.26-2-footbridge - 2.6.26-22lenny1
linux-image-2.6.26-2-footbridge - 2.6.26-22lenny1
linux-headers-2.6.26-2-iop32x - 2.6.26-22lenny1
linux-image-2.6.26-2-orion5x - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-arm - 2.6.26-22lenny1
linux-libc-dev - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
linux-headers-2.6.26-2-ixp4xx - 2.6.26-22lenny1
linux-image-2.6.26-2-ixp4xx - 2.6.26-22lenny1
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-headers-2.6.26-2-orion5x - 2.6.26-22lenny1

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

EPSS

Процентиль: 87%
0.03723
Низкий

7.8 High

CVSS2

Связанные уязвимости

ubuntu
больше 15 лет назад

drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing '\0' characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.

redhat
больше 15 лет назад

drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing '\0' characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.

nvd
больше 15 лет назад

drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing '\0' characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.

debian
больше 15 лет назад

drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 a ...

github
около 3 лет назад

drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing '\0' characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.

EPSS

Процентиль: 87%
0.03723
Низкий

7.8 High

CVSS2