Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2015-02229

Опубликовано: 01 янв. 2015
Источник: fstec
CVSS2: 10
EPSS Низкий

Описание

Множественные уязвимости пакета kernel-headers-2.4 операционной системы Debian GNU/Linux, эксплуатация которых может привести к нарушению конфиденциальности, целостности и доступности защищаемой информации. Эксплуатация уязвимостей может быть осуществлена удаленно

Вендор

Сообщество свободного программного обеспечения

Наименование ПО

Debian GNU/Linux

Версия ПО

до 3.1 (Debian GNU/Linux)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Критический уровень опасности (базовая оценка CVSS 2.0 составляет 10)

Возможные меры по устранению уязвимости

Проблема может быть решена обновлением операционной системы до следующих версий пакетов в зависимости от архитектуры:
Debian GNU/Linux 3.1:
ppc:
kernel-headers - 102sarge1
kernel-headers-2.4 - 102sarge1
kernel-headers-2.6 - 102sarge1
kernel-image-2.4-powerpc - 102sarge1
kernel-image-2.4-powerpc-smp - 102sarge1
kernel-image-2.6-power3 - 102sarge1
kernel-image-2.6-power3-smp - 102sarge1
kernel-image-2.6-power4 - 102sarge1
kernel-image-2.6-power4-smp - 102sarge1
kernel-image-2.6-powerpc - 102sarge1
kernel-image-2.6-powerpc-smp - 102sarge1
kernel-image-power3 - 102sarge1
kernel-image-power3-smp - 102sarge1
kernel-image-power4 - 102sarge1
kernel-image-power4-smp - 102sarge1
kernel-image-powerpc - 102sarge1
kernel-image-powerpc-smp - 102sarge1
kernel-build-2.6.8-3-power3 - 2.6.8-12sarge2
kernel-build-2.6.8-3-power3-smp - 2.6.8-12sarge2
kernel-build-2.6.8-3-power4 - 2.6.8-12sarge2
kernel-build-2.6.8-3-power4-smp - 2.6.8-12sarge2
kernel-build-2.6.8-3-powerpc - 2.6.8-12sarge2
kernel-build-2.6.8-3-powerpc-smp - 2.6.8-12sarge2
kernel-build-2.6.8-power3 - 2.6.8-12sarge1
kernel-build-2.6.8-power3-smp - 2.6.8-12sarge1
kernel-build-2.6.8-power4 - 2.6.8-12sarge1
kernel-build-2.6.8-power4-smp - 2.6.8-12sarge1
kernel-build-2.6.8-powerpc - 2.6.8-12sarge1
kernel-build-2.6.8-powerpc-smp - 2.6.8-12sarge1
kernel-headers-2.6.8 - 2.6.8-12sarge1
kernel-headers-2.6.8-3 - 2.6.8-12sarge2
kernel-image-2.6.8-3-power3 - 2.6.8-12sarge2
kernel-image-2.6.8-3-power3-smp - 2.6.8-12sarge2
kernel-image-2.6.8-3-power4 - 2.6.8-12sarge2
kernel-image-2.6.8-3-power4-smp - 2.6.8-12sarge2
kernel-image-2.6.8-3-powerpc - 2.6.8-12sarge2
kernel-image-2.6.8-3-powerpc-smp - 2.6.8-12sarge2
kernel-image-2.6.8-power3 - 2.6.8-12sarge1
kernel-image-2.6.8-power3-smp - 2.6.8-12sarge1
kernel-image-2.6.8-power4 - 2.6.8-12sarge1
kernel-image-2.6.8-power4-smp - 2.6.8-12sarge1
kernel-image-2.6.8-powerpc - 2.6.8-12sarge1
kernel-image-2.6.8-powerpc-smp - 2.6.8-12sarge1
mol-modules-2.6.8-3-powerpc - 0.9.70+2.6.8+12sarge1
mol-modules-2.6.8-3-powerpc-smp - 0.9.70+2.6.8+12sarge1
s390x:
kernel-headers-2.6.8-2 - 2.6.8-5sarge1
kernel-headers-2.6.8-3 - 2.6.8-5sarge2
kernel-image-2.6.8-2-s390 - 2.6.8-5sarge1
kernel-image-2.6.8-2-s390-tape - 2.6.8-5sarge1
kernel-image-2.6.8-2-s390x - 2.6.8-5sarge1
kernel-image-2.6.8-3-s390 - 2.6.8-5sarge2
kernel-image-2.6.8-3-s390-tape - 2.6.8-5sarge2
kernel-image-2.6.8-3-s390x - 2.6.8-5sarge2
m68k:
kernel-image-2.6.8-amiga - 2.6.8-4sarge2
kernel-image-2.6.8-atari - 2.6.8-4sarge2
kernel-image-2.6.8-bvme6000 - 2.6.8-4sarge2
kernel-image-2.6.8-hp - 2.6.8-4sarge2
kernel-image-2.6.8-mac - 2.6.8-4sarge2
kernel-image-2.6.8-mvme147 - 2.6.8-4sarge2
kernel-image-2.6.8-mvme16x - 2.6.8-4sarge2
kernel-image-2.6.8-q40 - 2.6.8-4sarge2
kernel-image-2.6.8-sun3 - 2.6.8-4sarge2
i686:
kernel-headers-2.6-amd64-generic - 103sarge1
kernel-headers-2.6-amd64-k8 - 103sarge1
kernel-headers-2.6-amd64-k8-smp - 103sarge1
kernel-headers-2.6-em64t-p4 - 103sarge1
kernel-headers-2.6-em64t-p4-smp - 103sarge1
kernel-image-2.6-amd64-generic - 103sarge1
kernel-image-2.6-amd64-k8 - 103sarge1
kernel-image-2.6-amd64-k8-smp - 103sarge1
kernel-image-2.6-em64t-p4 - 103sarge1
kernel-image-2.6-em64t-p4-smp - 103sarge1
kernel-headers-2.6-386 - 101sarge1
kernel-headers-2.6-686 - 101sarge1
kernel-headers-2.6-686-smp - 101sarge1
kernel-headers-2.6-k7 - 101sarge1
kernel-headers-2.6-k7-smp - 101sarge1
kernel-image-2.6-386 - 101sarge1
kernel-image-2.6-686 - 101sarge1
kernel-image-2.6-686-smp - 101sarge1
kernel-image-2.6-k7 - 101sarge1
kernel-image-2.6-k7-smp - 101sarge1
fai-kernels - 1.9.1sarge1
kernel-headers-2.6.8-2 - 2.6.8-16sarge1
kernel-headers-2.6.8-2-386 - 2.6.8-16sarge1
kernel-headers-2.6.8-2-686 - 2.6.8-16sarge1
kernel-headers-2.6.8-2-686-smp - 2.6.8-16sarge1
kernel-headers-2.6.8-2-k7 - 2.6.8-16sarge1
kernel-headers-2.6.8-2-k7-smp - 2.6.8-16sarge1
kernel-headers-2.6.8-3 - 2.6.8-16sarge2
kernel-headers-2.6.8-3-386 - 2.6.8-16sarge2
kernel-headers-2.6.8-3-686 - 2.6.8-16sarge2
kernel-headers-2.6.8-3-686-smp - 2.6.8-16sarge2
kernel-headers-2.6.8-3-k7 - 2.6.8-16sarge2
kernel-headers-2.6.8-3-k7-smp - 2.6.8-16sarge2
kernel-image-2.6.8-2-386 - 2.6.8-16sarge1
kernel-image-2.6.8-2-686 - 2.6.8-16sarge1
kernel-image-2.6.8-2-686-smp - 2.6.8-16sarge1
kernel-image-2.6.8-2-k7 - 2.6.8-16sarge1
kernel-image-2.6.8-2-k7-smp - 2.6.8-16sarge1
kernel-image-2.6.8-3-386 - 2.6.8-16sarge2
kernel-image-2.6.8-3-686 - 2.6.8-16sarge2
kernel-image-2.6.8-3-686-smp - 2.6.8-16sarge2
kernel-image-2.6.8-3-k7 - 2.6.8-16sarge2
kernel-image-2.6.8-3-k7-smp - 2.6.8-16sarge2
kernel-headers-2.6.8-11 - 2.6.8-16sarge1
kernel-headers-2.6.8-11-amd64-generic - 2.6.8-16sarge1
kernel-headers-2.6.8-11-amd64-k8 - 2.6.8-16sarge1
kernel-headers-2.6.8-11-amd64-k8-smp - 2.6.8-16sarge1
kernel-headers-2.6.8-11-em64t-p4 - 2.6.8-16sarge1
kernel-headers-2.6.8-11-em64t-p4-smp - 2.6.8-16sarge1
kernel-headers-2.6.8-12 - 2.6.8-16sarge2
kernel-headers-2.6.8-12-amd64-generic - 2.6.8-16sarge2
kernel-headers-2.6.8-12-amd64-k8 - 2.6.8-16sarge2
kernel-headers-2.6.8-12-amd64-k8-smp - 2.6.8-16sarge2
kernel-headers-2.6.8-12-em64t-p4 - 2.6.8-16sarge2
kernel-headers-2.6.8-12-em64t-p4-smp - 2.6.8-16sarge2
kernel-image-2.6.8-11-amd64-generic - 2.6.8-16sarge1
kernel-image-2.6.8-11-amd64-k8 - 2.6.8-16sarge1
kernel-image-2.6.8-11-amd64-k8-smp - 2.6.8-16sarge1
kernel-image-2.6.8-11-em64t-p4 - 2.6.8-16sarge1
kernel-image-2.6.8-11-em64t-p4-smp - 2.6.8-16sarge1
kernel-image-2.6.8-12-amd64-generic - 2.6.8-16sarge2
kernel-image-2.6.8-12-amd64-k8 - 2.6.8-16sarge2
kernel-image-2.6.8-12-amd64-k8-smp - 2.6.8-16sarge2
kernel-image-2.6.8-12-em64t-p4 - 2.6.8-16sarge2
kernel-image-2.6.8-12-em64t-p4-smp - 2.6.8-16sarge2
hostap-modules-2.4.27-3-386 - 0.3.7-1sarge1
hostap-modules-2.4.27-3-586tsc - 0.3.7-1sarge1
hostap-modules-2.4.27-3-686 - 0.3.7-1sarge1
hostap-modules-2.4.27-3-686-smp - 0.3.7-1sarge1
hostap-modules-2.4.27-3-k6 - 0.3.7-1sarge1
hostap-modules-2.4.27-3-k7 - 0.3.7-1sarge1
hostap-modules-2.4.27-3-k7-smp - 0.3.7-1sarge1
hostap-modules-2.6.8-3-386 - 0.3.7-1sarge1
hostap-modules-2.6.8-3-686 - 0.3.7-1sarge1
hostap-modules-2.6.8-3-686-smp - 0.3.7-1sarge1
hostap-modules-2.6.8-3-k7 - 0.3.7-1sarge1
hostap-modules-2.6.8-3-k7-smp - 0.3.7-1sarge1
ndiswrapper-modules-2.6.8-3-386 - 1.1-2sarge1
ndiswrapper-modules-2.6.8-3-686 - 1.1-2sarge1
ndiswrapper-modules-2.6.8-3-686-smp - 1.1-2sarge1
ndiswrapper-modules-2.6.8-3-k7 - 1.1-2sarge1
ndiswrapper-modules-2.6.8-3-k7-smp - 1.1-2sarge1
sparc:
kernel-headers-2.6-sparc32 - 101sarge1
kernel-headers-2.6-sparc64 - 101sarge1
kernel-headers-2.6-sparc64-smp - 101sarge1
kernel-image-2.6-sparc32 - 101sarge1
kernel-image-2.6-sparc64 - 101sarge1
kernel-image-2.6-sparc64-smp - 101sarge1
kernel-build-2.6.8-2 - 2.6.8-15sarge1
kernel-build-2.6.8-3 - 2.6.8-15sarge2
kernel-headers-2.6.8-2 - 2.6.8-15sarge1
kernel-headers-2.6.8-2-sparc32 - 2.6.8-15sarge1
kernel-headers-2.6.8-2-sparc64 - 2.6.8-15sarge1
kernel-headers-2.6.8-2-sparc64-smp - 2.6.8-15sarge1
kernel-headers-2.6.8-3 - 2.6.8-15sarge2
kernel-headers-2.6.8-3-sparc32 - 2.6.8-15sarge2
kernel-headers-2.6.8-3-sparc64 - 2.6.8-15sarge2
kernel-headers-2.6.8-3-sparc64-smp - 2.6.8-15sarge2
kernel-image-2.6.8-2-sparc32 - 2.6.8-15sarge1
kernel-image-2.6.8-2-sparc64 - 2.6.8-15sarge1
kernel-image-2.6.8-2-sparc64-smp - 2.6.8-15sarge1
kernel-image-2.6.8-3-sparc32 - 2.6.8-15sarge2
kernel-image-2.6.8-3-sparc64 - 2.6.8-15sarge2
kernel-image-2.6.8-3-sparc64-smp - 2.6.8-15sarge2
x86-64:
kernel-headers-2.6-amd64-generic - 103sarge1
kernel-headers-2.6-amd64-k8 - 103sarge1
kernel-headers-2.6-amd64-k8-smp - 103sarge1
kernel-headers-2.6-em64t-p4 - 103sarge1
kernel-headers-2.6-em64t-p4-smp - 103sarge1
kernel-image-2.6-amd64-generic - 103sarge1
kernel-image-2.6-amd64-k8 - 103sarge1
kernel-image-2.6-amd64-k8-smp - 103sarge1
kernel-image-2.6-em64t-p4 - 103sarge1
kernel-image-2.6-em64t-p4-smp - 103sarge1
kernel-headers-2.6.8-11 - 2.6.8-16sarge1
kernel-headers-2.6.8-11-amd64-generic - 2.6.8-16sarge1
kernel-headers-2.6.8-11-amd64-k8 - 2.6.8-16sarge1
kernel-headers-2.6.8-11-amd64-k8-smp - 2.6.8-16sarge1
kernel-headers-2.6.8-11-em64t-p4 - 2.6.8-16sarge1
kernel-headers-2.6.8-11-em64t-p4-smp - 2.6.8-16sarge1
kernel-headers-2.6.8-12 - 2.6.8-16sarge2
kernel-headers-2.6.8-12-amd64-generic - 2.6.8-16sarge2
kernel-headers-2.6.8-12-amd64-k8 - 2.6.8-16sarge2
kernel-headers-2.6.8-12-amd64-k8-smp - 2.6.8-16sarge2
kernel-headers-2.6.8-12-em64t-p4 - 2.6.8-16sarge2
kernel-headers-2.6.8-12-em64t-p4-smp - 2.6.8-16sarge2
kernel-image-2.6.8-11-amd64-generic - 2.6.8-16sarge1
kernel-image-2.6.8-11-amd64-k8 - 2.6.8-16sarge1
kernel-image-2.6.8-11-amd64-k8-smp - 2.6.8-16sarge1
kernel-image-2.6.8-11-em64t-p4 - 2.6.8-16sarge1
kernel-image-2.6.8-11-em64t-p4-smp - 2.6.8-16sarge1
kernel-image-2.6.8-12-amd64-generic - 2.6.8-16sarge2
kernel-image-2.6.8-12-amd64-k8 - 2.6.8-16sarge2
kernel-image-2.6.8-12-amd64-k8-smp - 2.6.8-16sarge2
kernel-image-2.6.8-12-em64t-p4 - 2.6.8-16sarge2
kernel-image-2.6.8-12-em64t-p4-smp - 2.6.8-16sarge2
ia64:
kernel-headers-2.6-itanium - 2.6.8-14sarge2
kernel-headers-2.6-itanium-smp - 2.6.8-14sarge2
kernel-headers-2.6-mckinley - 2.6.8-14sarge2
kernel-headers-2.6-mckinley-smp - 2.6.8-14sarge2
kernel-headers-2.6.8-2 - 2.6.8-14sarge1
kernel-headers-2.6.8-2-itanium - 2.6.8-14sarge1
kernel-headers-2.6.8-2-itanium-smp - 2.6.8-14sarge1
kernel-headers-2.6.8-2-mckinley - 2.6.8-14sarge1
kernel-headers-2.6.8-2-mckinley-smp - 2.6.8-14sarge1
kernel-headers-2.6.8-3 - 2.6.8-14sarge2
kernel-headers-2.6.8-3-itanium - 2.6.8-14sarge2
kernel-headers-2.6.8-3-itanium-smp - 2.6.8-14sarge2
kernel-headers-2.6.8-3-mckinley - 2.6.8-14sarge2
kernel-headers-2.6.8-3-mckinley-smp - 2.6.8-14sarge2
kernel-image-2.6-itanium - 2.6.8-14sarge2
kernel-image-2.6-itanium-smp - 2.6.8-14sarge2
kernel-image-2.6-mckinley - 2.6.8-14sarge2
kernel-image-2.6-mckinley-smp - 2.6.8-14sarge2
kernel-image-2.6.8-2-itanium - 2.6.8-14sarge1
kernel-image-2.6.8-2-itanium-smp - 2.6.8-14sarge1
kernel-image-2.6.8-2-mckinley - 2.6.8-14sarge1
kernel-image-2.6.8-2-mckinley-smp - 2.6.8-14sarge1
kernel-image-2.6.8-3-itanium - 2.6.8-14sarge2
kernel-image-2.6.8-3-itanium-smp - 2.6.8-14sarge2
kernel-image-2.6.8-3-mckinley - 2.6.8-14sarge2
kernel-image-2.6.8-3-mckinley-smp - 2.6.8-14sarge2
alpha:
kernel-headers-2.6-generic - 101sarge1
kernel-headers-2.6-smp - 101sarge1
kernel-image-2.6-generic - 101sarge1
kernel-image-2.6-smp - 101sarge1
kernel-headers-2.6.8-2 - 2.6.8-16sarge1
kernel-headers-2.6.8-2-generic - 2.6.8-16sarge1
kernel-headers-2.6.8-2-smp - 2.6.8-16sarge1
kernel-headers-2.6.8-3 - 2.6.8-16sarge2
kernel-headers-2.6.8-3-generic - 2.6.8-16sarge2
kernel-headers-2.6.8-3-smp - 2.6.8-16sarge2
kernel-image-2.6.8-2-generic - 2.6.8-16sarge1
kernel-image-2.6.8-2-smp - 2.6.8-16sarge1
kernel-image-2.6.8-3-generic - 2.6.8-16sarge2
kernel-image-2.6.8-3-smp - 2.6.8-16sarge2
noarch:
kernel-doc-2.6.8 - 2.6.8-16sarge2
kernel-patch-debian-2.6.8 - 2.6.8-16sarge2
kernel-source-2.6.8 - 2.6.8-16sarge2
kernel-tree-2.6.8 - 2.6.8-16sarg

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

EPSS

Процентиль: 35%
0.00136
Низкий

10 Critical

CVSS2

Связанные уязвимости

ubuntu
почти 20 лет назад

Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread.

redhat
почти 20 лет назад

Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread.

nvd
почти 20 лет назад

Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread.

debian
почти 20 лет назад

Stack-based buffer overflow in the sendmsg function call in the Linux ...

github
около 3 лет назад

Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread.

EPSS

Процентиль: 35%
0.00136
Низкий

10 Critical

CVSS2