Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2015-03592

Опубликовано: 01 янв. 2015
Источник: fstec
CVSS2: 7.8
EPSS Низкий

Описание

Множественные уязвимости пакета i2c-2.4.27-4-k6 операционной системы Debian GNU/Linux, эксплуатация которых может привести к нарушению доступности защищаемой информации. Эксплуатация уязвимостей может быть осуществлена удаленно

Вендор

Сообщество свободного программного обеспечения

Наименование ПО

Debian GNU/Linux

Версия ПО

до 3.1 (Debian GNU/Linux)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 7,8)

Возможные меры по устранению уязвимости

Проблема может быть решена обновлением операционной системы до следующих версий пакетов в зависимости от архитектуры:
Debian GNU/Linux 3.1:
ppc:
mips-tools - 2.4.27-10.sarge4.040815-3
kernel-image-2.4.27-powerpc-small - 2.4.27-10sarge6
kernel-image-2.4.27-powerpc-smp - 2.4.27-10sarge6
kernel-image-2.4.27-nubus - 2.4.27-10sarge6
kernel-image-2.4.27-powerpc - 2.4.27-10sarge6
kernel-patch-2.4.27-powerpc - 2.4.27-10sarge6
kernel-patch-2.4.27-nubus - 2.4.27-10sarge6
kernel-headers-2.4.27-powerpc - 2.4.27-10sarge6
kernel-build-2.4.27-apus - 2.4.27-10sarge6
kernel-headers-2.4.27-nubus - 2.4.27-10sarge6
kernel-patch-2.4.27-apus - 2.4.27-10sarge6
kernel-image-2.4.27-apus - 2.4.27-10sarge6
kernel-headers-2.4.27-apus - 2.4.27-10sarge6
kernel-build-2.4.27-powerpc-smp - 2.4.27-10sarge6
kernel-build-2.4.27-nubus - 2.4.27-10sarge6
kernel-build-2.4.27-powerpc - 2.4.27-10sarge6
kernel-build-2.4.27-powerpc-small - 2.4.27-10sarge6
s390x:
kernel-image-2.4.27-4-s390-tape - 2.4.27-2sarge6
kernel-image-2.4.27-4-s390x - 2.4.27-2sarge6
kernel-headers-2.4.27-4 - 2.4.27-2sarge6
kernel-headers-2.4-s390 - 2.4.27-1sarge2
kernel-image-2.4-s390x - 2.4.27-1sarge2
mips-tools - 2.4.27-10.sarge4.040815-3
kernel-image-2.4.27-4-s390 - 2.4.27-2sarge6
kernel-image-2.4-s390 - 2.4.27-1sarge2
m68k:
kernel-image-2.4.27-amiga - 2.4.27-3sarge6
kernel-image-2.4.27-mac - 2.4.27-3sarge6
kernel-image-2.4.27-mvme16x - 2.4.27-3sarge6
kernel-image-2.4.27-mvme147 - 2.4.27-3sarge6
kernel-image-2.4.27-bvme6000 - 2.4.27-3sarge6
mips-tools - 2.4.27-10.sarge4.040815-3
kernel-image-2.4.27-atari - 2.4.27-3sarge6
kernel-image-2.4.27-q40 - 2.4.27-3sarge6
i686:
kernel-image-2.4-k7 - 101sarge2
i2c-2.4.27-4-386 - 2.9.1-1sarge2
kernel-pcmcia-modules-2.4.27-4-k7-smp - 2.4.27-10sarge6
kernel-pcmcia-modules-2.4.27-4-k7 - 2.4.27-10sarge6
kernel-headers-2.4-686 - 101sarge2
i2c-2.4.27-4-k7 - 2.9.1-1sarge2
kernel-image-2.4.27-speakup - 2.4.27-1.1sarge5
kernel-headers-2.4-386 - 101sarge2
hostap-modules-2.6.8-4-686 - 0.3.7-1sarge3
kernel-image-2.4-k7-smp - 101sarge2
mips-tools - 2.4.27-10.sarge4.040815-3
kernel-headers-2.4.27-4-386 - 2.4.27-10sarge6
pcmcia-modules-2.4.27-4-586tsc - 3.2.5+2sarge2
lm-sensors-2.4.27-4-k6 - 2.9.1-1sarge4
kernel-image-2.4.27-4-k7-smp - 2.4.27-10sarge6
kernel-pcmcia-modules-2.4-686 - 101sarge2
kernel-image-2.4.27-4-686 - 2.4.27-10sarge6
pcmcia-modules-2.4.27-4-k6 - 3.2.5+2sarge2
lm-sensors-2.4.27-4-386 - 2.9.1-1sarge4
kernel-headers-2.4-k7-smp - 101sarge2
kernel-image-2.4-586tsc - 101sarge2
lm-sensors-2.4.27-4-686-smp - 2.9.1-1sarge4
libsensors3 - 2.9.1-1sarge4
kernel-headers-2.4.27-4-586tsc - 2.4.27-10sarge6
kernel-headers-2.4.27-4 - 2.4.27-10sarge6
kernel-image-2.4-686 - 101sarge2
kernel-image-2.4-386 - 101sarge2
kernel-headers-2.4-k6 - 101sarge2
kernel-pcmcia-modules-2.4-686-smp - 101sarge2
kernel-pcmcia-modules-2.4-386 - 101sarge2
i2c-2.4.27-4-k7-smp - 2.9.1-1sarge2
i2c-2.4.27-4-686-smp - 2.9.1-1sarge2
i2c-2.4.27-4-686 - 2.9.1-1sarge2
kernel-headers-2.4-586tsc - 101sarge2
hostap-modules-2.6.8-4-686-smp - 0.3.7-1sarge3
hostap-modules-2.4.27-4-k7 - 0.3.7-1sarge3
kernel-headers-2.4-686-smp - 101sarge2
i2c-2.4.27-4-k6 - 2.9.1-1sarge2
kernel-pcmcia-modules-2.4.27-4-686-smp - 2.4.27-10sarge6
hostap-modules-2.4.27-4-586tsc - 0.3.7-1sarge3
hostap-modules-2.4.27-4-686-smp - 0.3.7-1sarge3
kernel-headers-2.4.27-4-686-smp - 2.4.27-10sarge6
kernel-pcmcia-modules-2.4.27-4-586tsc - 2.4.27-10sarge6
kernel-pcmcia-modules-2.4-k7-smp - 101sarge2
kernel-headers-2.4.27-speakup - 2.4.27-1.1sarge5
lm-sensors-2.4.27-4-686 - 2.9.1-1sarge4
hostap-modules-2.4.27-4-386 - 0.3.7-1sarge3
kernel-image-2.4.27-4-k7 - 2.4.27-10sarge6
hostap-modules-2.6.8-4-k7 - 0.3.7-1sarge3
kernel-image-2.4.27-4-686-smp - 2.4.27-10sarge6
hostap-modules-2.6.8-4-k7-smp - 0.3.7-1sarge3
pcmcia-modules-2.4.27-4-k7 - 3.2.5+2sarge2
kernel-headers-2.4.27-4-k6 - 2.4.27-10sarge6
hostap-modules-2.4.27-4-k6 - 0.3.7-1sarge3
hostap-modules-2.6.8-4-386 - 0.3.7-1sarge3
kernel-pcmcia-modules-2.4-k7 - 101sarge2
pcmcia-modules-2.4.27-4-k7-smp - 3.2.5+2sarge2
kernel-headers-2.4.27-4-686 - 2.4.27-10sarge6
pcmcia-modules-2.4.27-4-686 - 3.2.5+2sarge2
lm-sensors-2.4.27-4-k7-smp - 2.9.1-1sarge4
kernel-pcmcia-modules-2.4.27-4-686 - 2.4.27-10sarge6
libsensors-dev - 2.9.1-1sarge4
kernel-pcmcia-modules-2.4-586tsc - 101sarge2
kernel-headers-2.4.27-4-k7 - 2.4.27-10sarge6
kernel-image-2.4.27-4-k6 - 2.4.27-10sarge6
kernel-headers-2.4-k7 - 101sarge2
kernel-pcmcia-modules-2.4-k6 - 101sarge2
kernel-build-2.4.27-4 - 2.4.27-10sarge6
kernel-image-2.4-k6 - 101sarge2
hostap-modules-2.4.27-4-686 - 0.3.7-1sarge3
lm-sensors-2.4.27-4-k7 - 2.9.1-1sarge4
kernel-pcmcia-modules-2.4.27-4-386 - 2.4.27-10sarge6
lm-sensors-2.4.27-4-586tsc - 2.9.1-1sarge4
mindi-kernel - 2.4.27-2sarge5
kernel-pcmcia-modules-2.4.27-4-k6 - 2.4.27-10sarge6
i2c-2.4.27-4-586tsc - 2.9.1-1sarge2
pcmcia-modules-2.4.27-4-686-smp - 3.2.5+2sarge2
kernel-image-2.4-686-smp - 101sarge2
lm-sensors - 2.9.1-1sarge4
kernel-image-2.4.27-4-386 - 2.4.27-10sarge6
sensord - 2.9.1-1sarge4
kernel-headers-2.4.27-4-k7-smp - 2.4.27-10sarge6
hostap-modules-2.4.27-4-k7-smp - 0.3.7-1sarge3
pcmcia-modules-2.4.27-4-386 - 3.2.5+2sarge2
kernel-image-2.4.27-4-586tsc - 2.4.27-10sarge6
hppa:
mips-tools - 2.4.27-10.sarge4.040815-3
sparc:
kernel-image-2.4-sparc64-smp - 42sarge3
kernel-image-2.4-sparc32-smp - 42sarge3
kernel-image-2.4-sparc32 - 42sarge3
kernel-image-2.4-sparc64 - 42sarge3
kernel-image-2.4.27-4-sparc32-smp - 2.4.27-9sarge6
kernel-headers-2.4.27-4-sparc32 - 2.4.27-9sarge6
kernel-headers-2.4.27-4-sparc64 - 2.4.27-9sarge6
kernel-headers-2.4.27-4-sparc64-smp - 2.4.27-9sarge6
kernel-headers-2.4.27-4 - 2.4.27-9sarge6
kernel-headers-2.4-sparc64-smp - 42sarge3
kernel-headers-2.4.27-4-sparc32-smp - 2.4.27-9sarge6
kernel-image-2.4.27-4-sparc32 - 2.4.27-9sarge6
kernel-headers-2.4-sparc32-smp - 42sarge3
kernel-headers-2.4-sparc64 - 42sarge3
mips-tools - 2.4.27-10.sarge4.040815-3
kernel-build-2.4.27-4 - 2.4.27-9sarge6
kernel-image-2.4.27-4-sparc64 - 2.4.27-9sarge6
kernel-headers-2.4-sparc32 - 42sarge3
kernel-image-2.4.27-4-sparc64-smp - 2.4.27-9sarge6
x86-64:
mips-tools - 2.4.27-10.sarge4.040815-3
alpha:
kernel-headers-2.4-generic - 101sarge3
kernel-headers-2.4.27-4-generic - 2.4.27-10sarge6
kernel-image-2.4.27-4-smp - 2.4.27-10sarge6
kernel-build-2.4.27-4 - 2.4.27-10sarge6
mips-tools - 2.4.27-10.sarge4.040815-3
kernel-image-2.4-generic - 101sarge3
kernel-headers-2.4.27-4-smp - 2.4.27-10sarge6
kernel-image-2.4-smp - 101sarge3
kernel-headers-2.4-smp - 101sarge3
kernel-image-2.4.27-4-generic - 2.4.27-10sarge6
kernel-headers-2.4.27-4 - 2.4.27-10sarge6
ia64:
kernel-image-2.4-mckinley-smp - 2.4.27-10sarge6
kernel-image-2.4.27-4-mckinley-smp - 2.4.27-10sarge6
kernel-headers-2.4.27-4-itanium - 2.4.27-10sarge6
kernel-image-2.4.27-4-mckinley - 2.4.27-10sarge6
kernel-image-2.4.27-4-itanium - 2.4.27-10sarge6
kernel-headers-2.4.27-4-mckinley - 2.4.27-10sarge6
kernel-image-2.4-itanium-smp - 2.4.27-10sarge6
mips-tools - 2.4.27-10.sarge4.040815-3
kernel-headers-2.4.27-4-itanium-smp - 2.4.27-10sarge6
kernel-image-2.4-mckinley - 2.4.27-10sarge6
kernel-headers-2.4.27-4-mckinley-smp - 2.4.27-10sarge6
kernel-image-2.4.27-4-itanium-smp - 2.4.27-10sarge6
kernel-image-2.4-itanium - 2.4.27-10sarge6
kernel-headers-2.4.27-4 - 2.4.27-10sarge6
kernel-build-2.4.27-4 - 2.4.27-10sarge6
mips:
kernel-image-2.4.27-r5k-ip22 - 2.4.27-10.sarge4.040815-3
kernel-headers-2.4.27 - 2.4.27-10.sarge4.040815-3
kernel-image-2.4.27-sb1-swarm-bn - 2.4.27-10.sarge4.040815-3
mips-tools - 2.4.27-10.sarge4.040815-3
kernel-image-2.4.27-r4k-ip22 - 2.4.27-10.sarge4.040815-3
noarch:
i2c-source - 2.9.1-1sarge2
kernel-doc-2.4.27-speakup - 2.4.27-1.1sarge5
systemimager-server - 3.2.3-6sarge5
kernel-patch-debian-2.4.27 - 2.4.27-10sarge6
kernel-patch-2.4-lm-sensors - 2.9.1-1sarge4
kernel-tree-2.4.27 - 2.4.27-10sarge6
kernel-source-2.4.27 - 2.4.27-10sarge6
systemimager-client - 3.2.3-6sarge5
systemimager-server-flamethrowerd - 3.2.3-6sarge5
systemimager-boot-ia64-standard - 3.2.3-6sarge5
kernel-patch-2.4-i2c - 2.9.1-1sarge2
kernel-doc-2.4.27 - 2.4.27-10sarge6
systemimager-doc - 3.2.3-6sarge5
lm-sensors-source - 2.9.1-1sarge4
systemimager-boot-i386-standard - 3.2.3-6sarge5
systemimager-common - 3.2.3-6sarge5
mipsel:
kernel-image-2.4.27-r5k-lasat - 2.4.27-10.sarge4.040815-3
kernel-image-2.4.27-r5k-cobalt - 2.4.27-10.sarge4.040815-3
kernel-headers-2.4.27 - 2.4.27-10.sarge4.040815-3
kernel-image-2.4.27-xxs1500 - 2.4.27-10.sarge4.040815-3
mips-tools - 2.4.27-10.sarge4.040815-3
kernel-image-2.4.27-r4k-kn04 - 2.4.27-10.sarge4.040815-3
kernel-image-2.4.27-r3k-kn02 - 2.4.27-10.sarge4.040815-3
kernel-image-2.4.27-sb1-swarm-bn - 2.4.27-10.sarge4.040815-3
arm:
kernel-image-2.4.27-bast - 2.4.27-2sarge6
kernel-image-2.4.27-lart - 2.4.27-2sarge6
kernel-build-2.4.27 - 2.4.27-2sarge6
kernel-image-2.4.27-riscpc - 2.4.27-2sarge6
kernel-headers-2.4.27 - 2.4.27-2sarge6
mips-tools - 2.4.27-10.sarge4.040815-3
kernel-image-2.4.27-netwinder - 2.4.27-2sarge6
kernel-image-2.4.27-riscstation - 2.4.27-2sarge

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

EPSS

Процентиль: 32%
0.0012
Низкий

7.8 High

CVSS2

Связанные уязвимости

redhat
больше 20 лет назад

Multiple integer overflows in Sbus PROM driver (drivers/sbus/char/openprom.c) for the Linux kernel 2.4.x up to 2.4.27, 2.6.x up to 2.6.7, and possibly later versions, allow local users to execute arbitrary code by specifying (1) a small buffer size to the copyin_string function or (2) a negative buffer size to the copyin function.

nvd
больше 20 лет назад

Multiple integer overflows in Sbus PROM driver (drivers/sbus/char/openprom.c) for the Linux kernel 2.4.x up to 2.4.27, 2.6.x up to 2.6.7, and possibly later versions, allow local users to execute arbitrary code by specifying (1) a small buffer size to the copyin_string function or (2) a negative buffer size to the copyin function.

debian
больше 20 лет назад

Multiple integer overflows in Sbus PROM driver (drivers/sbus/char/open ...

github
около 3 лет назад

Multiple integer overflows in Sbus PROM driver (drivers/sbus/char/openprom.c) for the Linux kernel 2.4.x up to 2.4.27, 2.6.x up to 2.6.7, and possibly later versions, allow local users to execute arbitrary code by specifying (1) a small buffer size to the copyin_string function or (2) a negative buffer size to the copyin function.

fstec
больше 10 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации

EPSS

Процентиль: 32%
0.0012
Низкий

7.8 High

CVSS2