Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2015-03499

Опубликовано: 31 дек. 2005
Источник: fstec
CVSS2: 7.8
EPSS Низкий

Описание

Множественные уязвимости пакета kernel-patch-2.4.27-s390 операционной системы Debian GNU/Linux, эксплуатация которых может привести к нарушению доступности защищаемой информации. Эксплуатация уязвимостей может быть осуществлена удаленно

Вендор

Сообщество свободного программного обеспечения

Наименование ПО

Debian GNU/Linux

Версия ПО

до 3.1 (Debian GNU/Linux)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 7,8)

Возможные меры по устранению уязвимости

Проблема может быть решена обновлением операционной системы до следующих версий пакетов в зависимости от архитектуры:
Debian GNU/Linux 3.1:
ppc:
kernel-build-2.4.27-apus - 2.4.27-10sarge4
kernel-build-2.4.27-nubus - 2.4.27-10sarge4
kernel-build-2.4.27-powerpc - 2.4.27-10sarge4
kernel-build-2.4.27-powerpc-small - 2.4.27-10sarge4
kernel-build-2.4.27-powerpc-smp - 2.4.27-10sarge4
kernel-headers-2.4.27-apus - 2.4.27-10sarge4
kernel-headers-2.4.27-nubus - 2.4.27-10sarge4
kernel-headers-2.4.27-powerpc - 2.4.27-10sarge4
kernel-image-2.4.27-apus - 2.4.27-10sarge4
kernel-image-2.4.27-nubus - 2.4.27-10sarge4
kernel-image-2.4.27-powerpc - 2.4.27-10sarge4
kernel-image-2.4.27-powerpc-small - 2.4.27-10sarge4
kernel-image-2.4.27-powerpc-smp - 2.4.27-10sarge4
kernel-patch-2.4.27-apus - 2.4.27-10sarge4
kernel-patch-2.4.27-nubus - 2.4.27-10sarge4
kernel-patch-2.4.27-powerpc - 2.4.27-10sarge4
mips-tools - 2.4.27-10.sarge4.040815-1
s390x:
kernel-headers-2.4.27-2 - 2.4.27-2sarge1
kernel-headers-2.4.27-3 - 2.4.27-2sarge4
kernel-image-2.4.27-2-s390 - 2.4.27-2sarge1
kernel-image-2.4.27-2-s390-tape - 2.4.27-2sarge1
kernel-image-2.4.27-2-s390x - 2.4.27-2sarge1
kernel-image-2.4.27-3-s390 - 2.4.27-2sarge4
kernel-image-2.4.27-3-s390-tape - 2.4.27-2sarge4
kernel-image-2.4.27-3-s390x - 2.4.27-2sarge4
mips-tools - 2.4.27-10.sarge4.040815-1
m68k:
kernel-image-2.4.27-amiga - 2.4.27-3sarge4
kernel-image-2.4.27-atari - 2.4.27-3sarge4
kernel-image-2.4.27-bvme6000 - 2.4.27-3sarge4
kernel-image-2.4.27-mac - 2.4.27-3sarge4
kernel-image-2.4.27-mvme147 - 2.4.27-3sarge4
kernel-image-2.4.27-mvme16x - 2.4.27-3sarge4
kernel-image-2.4.27-q40 - 2.4.27-3sarge4
mips-tools - 2.4.27-10.sarge4.040815-1
i686:
kernel-build-2.4.27-2 - 2.4.27-10sarge1
kernel-build-2.4.27-3 - 2.4.27-10sarge4
kernel-headers-2.4.27-2 - 2.4.27-10sarge1
kernel-headers-2.4.27-2-386 - 2.4.27-10sarge1
kernel-headers-2.4.27-2-586tsc - 2.4.27-10sarge1
kernel-headers-2.4.27-2-686 - 2.4.27-10sarge1
kernel-headers-2.4.27-2-686-smp - 2.4.27-10sarge1
kernel-headers-2.4.27-2-k6 - 2.4.27-10sarge1
kernel-headers-2.4.27-2-k7 - 2.4.27-10sarge1
kernel-headers-2.4.27-2-k7-smp - 2.4.27-10sarge1
kernel-headers-2.4.27-3 - 2.4.27-10sarge4
kernel-headers-2.4.27-3-386 - 2.4.27-10sarge4
kernel-headers-2.4.27-3-586tsc - 2.4.27-10sarge4
kernel-headers-2.4.27-3-686 - 2.4.27-10sarge4
kernel-headers-2.4.27-3-686-smp - 2.4.27-10sarge4
kernel-headers-2.4.27-3-k6 - 2.4.27-10sarge4
kernel-headers-2.4.27-3-k7 - 2.4.27-10sarge4
kernel-headers-2.4.27-3-k7-smp - 2.4.27-10sarge4
kernel-image-2.4.27-2-386 - 2.4.27-10sarge1
kernel-image-2.4.27-2-586tsc - 2.4.27-10sarge1
kernel-image-2.4.27-2-686 - 2.4.27-10sarge1
kernel-image-2.4.27-2-686-smp - 2.4.27-10sarge1
kernel-image-2.4.27-2-k6 - 2.4.27-10sarge1
kernel-image-2.4.27-2-k7 - 2.4.27-10sarge1
kernel-image-2.4.27-2-k7-smp - 2.4.27-10sarge1
kernel-image-2.4.27-3-386 - 2.4.27-10sarge4
kernel-image-2.4.27-3-586tsc - 2.4.27-10sarge4
kernel-image-2.4.27-3-686 - 2.4.27-10sarge4
kernel-image-2.4.27-3-686-smp - 2.4.27-10sarge4
kernel-image-2.4.27-3-k6 - 2.4.27-10sarge4
kernel-image-2.4.27-3-k7 - 2.4.27-10sarge4
kernel-image-2.4.27-3-k7-smp - 2.4.27-10sarge4
kernel-pcmcia-modules-2.4.27-2-386 - 2.4.27-10sarge1
kernel-pcmcia-modules-2.4.27-2-586tsc - 2.4.27-10sarge1
kernel-pcmcia-modules-2.4.27-2-686 - 2.4.27-10sarge1
kernel-pcmcia-modules-2.4.27-2-686-smp - 2.4.27-10sarge1
kernel-pcmcia-modules-2.4.27-2-k6 - 2.4.27-10sarge1
kernel-pcmcia-modules-2.4.27-2-k7 - 2.4.27-10sarge1
kernel-pcmcia-modules-2.4.27-2-k7-smp - 2.4.27-10sarge1
kernel-pcmcia-modules-2.4.27-3-386 - 2.4.27-10sarge4
kernel-pcmcia-modules-2.4.27-3-586tsc - 2.4.27-10sarge4
kernel-pcmcia-modules-2.4.27-3-686 - 2.4.27-10sarge4
kernel-pcmcia-modules-2.4.27-3-686-smp - 2.4.27-10sarge4
kernel-pcmcia-modules-2.4.27-3-k6 - 2.4.27-10sarge4
kernel-pcmcia-modules-2.4.27-3-k7 - 2.4.27-10sarge4
kernel-pcmcia-modules-2.4.27-3-k7-smp - 2.4.27-10sarge4
mips-tools - 2.4.27-10.sarge4.040815-1
kernel-headers-2.4.27-speakup - 2.4.27-1.1sarge3
kernel-image-2.4.27-speakup - 2.4.27-1.1sarge3
mindi-kernel - 2.4.27-2sarge3
fai-kernels - 1.9.1sarge4
hppa:
mips-tools - 2.4.27-10.sarge4.040815-1
sparc:
kernel-build-2.4.27-2 - 2.4.27-9sarge1
kernel-build-2.4.27-3 - 2.4.27-9sarge4
kernel-headers-2.4.27-2 - 2.4.27-9sarge1
kernel-headers-2.4.27-2-sparc32 - 2.4.27-9sarge1
kernel-headers-2.4.27-2-sparc32-smp - 2.4.27-9sarge1
kernel-headers-2.4.27-2-sparc64 - 2.4.27-9sarge1
kernel-headers-2.4.27-2-sparc64-smp - 2.4.27-9sarge1
kernel-headers-2.4.27-3 - 2.4.27-9sarge4
kernel-headers-2.4.27-3-sparc32 - 2.4.27-9sarge4
kernel-headers-2.4.27-3-sparc32-smp - 2.4.27-9sarge4
kernel-headers-2.4.27-3-sparc64 - 2.4.27-9sarge4
kernel-headers-2.4.27-3-sparc64-smp - 2.4.27-9sarge4
kernel-image-2.4.27-2-sparc32 - 2.4.27-9sarge1
kernel-image-2.4.27-2-sparc32-smp - 2.4.27-9sarge1
kernel-image-2.4.27-2-sparc64 - 2.4.27-9sarge1
kernel-image-2.4.27-2-sparc64-smp - 2.4.27-9sarge1
kernel-image-2.4.27-3-sparc32 - 2.4.27-9sarge4
kernel-image-2.4.27-3-sparc32-smp - 2.4.27-9sarge4
kernel-image-2.4.27-3-sparc64 - 2.4.27-9sarge4
kernel-image-2.4.27-3-sparc64-smp - 2.4.27-9sarge4
mips-tools - 2.4.27-10.sarge4.040815-1
x86-64:
mips-tools - 2.4.27-10.sarge4.040815-1
alpha:
kernel-build-2.4.27-2 - 2.4.27-10sarge1
kernel-build-2.4.27-3 - 2.4.27-10sarge4
kernel-headers-2.4.27-2 - 2.4.27-10sarge1
kernel-headers-2.4.27-2-generic - 2.4.27-10sarge1
kernel-headers-2.4.27-2-smp - 2.4.27-10sarge1
kernel-headers-2.4.27-3 - 2.4.27-10sarge4
kernel-headers-2.4.27-3-generic - 2.4.27-10sarge4
kernel-headers-2.4.27-3-smp - 2.4.27-10sarge4
kernel-image-2.4.27-2-generic - 2.4.27-10sarge1
kernel-image-2.4.27-2-smp - 2.4.27-10sarge1
kernel-image-2.4.27-3-generic - 2.4.27-10sarge4
kernel-image-2.4.27-3-smp - 2.4.27-10sarge4
mips-tools - 2.4.27-10.sarge4.040815-1
ia64:
kernel-build-2.4.27-2 - 2.4.27-10sarge1
kernel-build-2.4.27-3 - 2.4.27-10sarge4
kernel-headers-2.4.27-2 - 2.4.27-10sarge1
kernel-headers-2.4.27-2-itanium - 2.4.27-10sarge1
kernel-headers-2.4.27-2-itanium-smp - 2.4.27-10sarge1
kernel-headers-2.4.27-2-mckinley - 2.4.27-10sarge1
kernel-headers-2.4.27-2-mckinley-smp - 2.4.27-10sarge1
kernel-headers-2.4.27-3 - 2.4.27-10sarge4
kernel-headers-2.4.27-3-itanium - 2.4.27-10sarge4
kernel-headers-2.4.27-3-itanium-smp - 2.4.27-10sarge4
kernel-headers-2.4.27-3-mckinley - 2.4.27-10sarge4
kernel-headers-2.4.27-3-mckinley-smp - 2.4.27-10sarge4
kernel-image-2.4-itanium - 2.4.27-10sarge4
kernel-image-2.4-itanium-smp - 2.4.27-10sarge4
kernel-image-2.4-mckinley - 2.4.27-10sarge4
kernel-image-2.4-mckinley-smp - 2.4.27-10sarge4
kernel-image-2.4.27-2-itanium - 2.4.27-10sarge1
kernel-image-2.4.27-2-itanium-smp - 2.4.27-10sarge1
kernel-image-2.4.27-2-mckinley - 2.4.27-10sarge1
kernel-image-2.4.27-2-mckinley-smp - 2.4.27-10sarge1
kernel-image-2.4.27-3-itanium - 2.4.27-10sarge4
kernel-image-2.4.27-3-itanium-smp - 2.4.27-10sarge4
kernel-image-2.4.27-3-mckinley - 2.4.27-10sarge4
kernel-image-2.4.27-3-mckinley-smp - 2.4.27-10sarge4
mips-tools - 2.4.27-10.sarge4.040815-1
mips:
kernel-headers-2.4.27 - 2.4.27-10.sarge4.040815-1
kernel-image-2.4.27-r4k-ip22 - 2.4.27-10.sarge4.040815-1
kernel-image-2.4.27-r5k-ip22 - 2.4.27-10.sarge4.040815-1
kernel-image-2.4.27-sb1-swarm-bn - 2.4.27-10.sarge4.040815-1
mips-tools - 2.4.27-10.sarge4.040815-1
noarch:
kernel-doc-2.4.27 - 2.4.27-10sarge4
kernel-patch-debian-2.4.27 - 2.4.27-10sarge4
kernel-source-2.4.27 - 2.4.27-10sarge4
kernel-tree-2.4.27 - 2.4.27-10sarge4
kernel-patch-2.4.27-s390 - 2.4.27-2sarge1
kernel-doc-2.4.27-speakup - 2.4.27-1.1sarge3
systemimager-boot-i386-standard - 3.2.3-6sarge3
systemimager-boot-ia64-standard - 3.2.3-6sarge3
systemimager-client - 3.2.3-6sarge3
systemimager-common - 3.2.3-6sarge3
systemimager-doc - 3.2.3-6sarge3
systemimager-server-flamethrowerd - 3.2.3-6sarge3
systemimager-server - 3.2.3-6sarge3
mipsel:
kernel-headers-2.4.27 - 2.4.27-10.sarge4.040815-1
kernel-image-2.4.27-r3k-kn02 - 2.4.27-10.sarge4.040815-1
kernel-image-2.4.27-r4k-kn04 - 2.4.27-10.sarge4.040815-1
kernel-image-2.4.27-r5k-cobalt - 2.4.27-10.sarge4.040815-1
kernel-image-2.4.27-r5k-lasat - 2.4.27-10.sarge4.040815-1
kernel-image-2.4.27-sb1-swarm-bn - 2.4.27-10.sarge4.040815-1
kernel-image-2.4.27-xxs1500 - 2.4.27-10.sarge4.040815-1
mips-tools - 2.4.27-10.sarge4.040815-1
arm:
kernel-build-2.4.27 - 2.4.27-2sarge4
kernel-headers-2.4.27 - 2.4.27-2sarge4
kernel-image-2.4.27-bast - 2.4.27-2sarge4
kernel-image-2.4.27-lart - 2.4.27-2sarge4
kernel-image-2.4.27-netwinder - 2.4.27-2sarge4
kernel-image-2.4.27-riscpc - 2.4.27-2sarge4
kernel-image-2.4.27-riscstation - 2.4.27-2sarge4
mips-tools - 2.4.27-10.sarge4.040815-1

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

EPSS

Процентиль: 75%
0.00892
Низкий

7.8 High

CVSS2

Связанные уязвимости

redhat
почти 20 лет назад

Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client.

nvd
больше 19 лет назад

Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client.

debian
больше 19 лет назад

Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to ...

github
больше 3 лет назад

Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client.

EPSS

Процентиль: 75%
0.00892
Низкий

7.8 High

CVSS2