CVE-2004-0587
CVSS2.1
发布时间 :2004-08-06 00:00:00
修订时间 :2010-08-21 00:20:49
NMCOS    

[原文]Insecure permissions for the /proc/scsi/qla2300/HbaApiNode file in Linux allows local users to cause a denial of service.


[CNNVD]SuSE Linux Kernel HbaApiNode不安全文件权限本地拒绝服务漏洞(CNNVD-200408-121)

        
        SuSE是一款开放源代码Linux系统。
        SuSE Linux kernel由于对'/proc/scsi/qla2300/HbaApiNode'文件权限设置不正确,本地攻击者可以利用这个漏洞对系统进行拒绝服务攻击。
        目前没有详细漏洞细节提供。
        

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:mandrakesoft:mandrake_linux:9.2::amd64
cpe:/o:mandrakesoft:mandrake_linux:10.0::amd64
cpe:/o:mandrakesoft:mandrake_linux:9.2MandrakeSoft Mandrake Linux 9.2
cpe:/o:suse:suse_linux:9.0SuSE SuSE Linux 9.0
cpe:/o:suse:suse_linux:8::enterprise_server
cpe:/o:mandrakesoft:mandrake_linux:10.0MandrakeSoft Mandrake Linux 10.0
cpe:/o:suse:suse_linux:8.1SuSE SuSE Linux 8.1
cpe:/o:redhat:fedora_core:core_1.0
cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1::x86_64
cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1MandrakeSoft Mandrake Linux Corporate Server 2.1

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:9398Insecure permissions for the /proc/scsi/qla2300/HbaApiNode file in Linux allows local users to cause a denial of service.
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0587
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0587
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200408-121
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/10279
(VENDOR_ADVISORY)  BID  10279
http://xforce.iss.net/xforce/xfdb/16062
(VENDOR_ADVISORY)  XF  suse-hbaapinode-dos(16062)
http://www.redhat.com/support/errata/RHSA-2004-418.html
(UNKNOWN)  REDHAT  RHSA-2004:418
http://www.redhat.com/support/errata/RHSA-2004-413.html
(UNKNOWN)  REDHAT  RHSA-2004:413
http://www.novell.com/linux/security/advisories/2004_10_kernel.html
(UNKNOWN)  SUSE  SuSE-SA:2004:010
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:066
(UNKNOWN)  MANDRAKE  MDKSA-2004:066
http://securitytracker.com/id?1010057
(UNKNOWN)  SECTRACK  1010057
http://lwn.net/Articles/91155/
(UNKNOWN)  FEDORA  FEDORA-2004-186
ftp://patches.sgi.com/support/free/security/advisories/20040804-01-U.asc
(UNKNOWN)  SGI  20040804-01-U

- 漏洞信息

SuSE Linux Kernel HbaApiNode不安全文件权限本地拒绝服务漏洞
低危 设计错误
2004-08-06 00:00:00 2005-10-20 00:00:00
本地  
        
        SuSE是一款开放源代码Linux系统。
        SuSE Linux kernel由于对'/proc/scsi/qla2300/HbaApiNode'文件权限设置不正确,本地攻击者可以利用这个漏洞对系统进行拒绝服务攻击。
        目前没有详细漏洞细节提供。
        

- 公告与补丁

        厂商补丁:
        S.u.S.E.
        --------
        S.u.S.E.已经为此发布了一个安全公告(SuSE-SA:2004:010)以及相应补丁:
        SuSE-SA:2004:010:kernel
        链接:
        补丁下载:
        Intel i386 Platform:
        SuSE-9.1:
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-default-2.6.4-54.3.i586.rpm
         8a5b723168ff272c728f07e731d20a99
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-smp-2.6.4-54.3.i586.rpm
         c36d4b4314c9a9143f99f15ed77f0e76
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-bigsmp-2.6.4-54.3.i586.rpm
         d8937c364a9361bdf17716d2f495579f
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-syms-2.6.4-54.3.i586.rpm
         38b3fc612e3db19f5d610cc0e8a32a6b
        patch rpm(s):
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-default-2.6.4-54.3.i586.patch.rpm
         c92c36168cae880b2161f10a09330a48
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-smp-2.6.4-54.3.i586.patch.rpm
         7e97b26abc8275b8a7bb13f2d7c8db40
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-bigsmp-2.6.4-54.3.i586.patch.rpm
         9804fe860e724c92e1bb2eeeec78ccb0
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-syms-2.6.4-54.3.i586.patch.rpm
         ac83a16e1f531aafe3ffe9f438ce1d78
        source rpm(s):
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-source-2.6.4-54.3.src.rpm
         065e5a4753dad819fabc6093ab8d08a2
        SuSE-9.0:
        ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/k_deflt-2.4.21-215.i586.rpm
         257bcaaa30ab31fcb60d777f2e71fd1d
        ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/k_athlon-2.4.21-215.i586.rpm
         7aecd6db43bfa1d8ec2006697e3d839a
        ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/k_smp-2.4.21-215.i586.rpm
         4c7bead1a476101fea816f22749b6d6e
        source rpm(s):
        ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/src/kernel-source-2.4.21-215.src.rpm
         4ce70dbb529bd750d08b5bd4d9e4d0be
        SuSE-8.2:
        ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/k_deflt-2.4.20-111.i586.rpm
         f10a9313b6c62f13b9c19e9939bd3131
        ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/k_athlon-2.4.20-111.i586.rpm
         521a2e74121271d5c8bf24de1f2103f0
        ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/k_smp-2.4.20-111.i586.rpm
         1af79925bbe45f9f18d52cbd906120a6
        ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/k_psmp-2.4.20-111.i586.rpm
         dd4f1b0c2ee5562d88befd4bf49d872c
        source rpm(s):
        ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/src/kernel-source-2.4.20.SuSE-111.src.rpm
         26b97b48cbff358c0045e3b63ce182a9
        SuSE-8.1:
        ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/k_deflt-2.4.21-215.i586.rpm
         61b56678254e46c7e54e8fb93ec2bee1
        ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/k_athlon-2.4.21-215.i586.rpm
         17c0a31f07d11865ac1c565987d9cd74
        ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/k_smp-2.4.21-215.i586.rpm
         e3838161492ebae56e6459770450fde0
        ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/k_psmp-2.4.21-215.i586.rpm
         9c15362446d844474cdd5d4d376d7379
        source rpm(s):
        ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/src/kernel-source-2.4.21-215.src.rpm
         099872db790919c4cbca6ed082d3f32b
        SuSE-8.0:
        ftp://ftp.suse.com/pub/suse/i386/update/8.0/images/k_deflt-2.4.18-293.i386.rpm
         69650d40b281fbe0e9783b52f1739d64
        ftp://ftp.suse.com/pub/suse/i386/update/8.0/images/k_smp-2.4.18-293.i386.rpm
         4600c955d7fb9fe55b5f8dc2e8c66cd0
        ftp://ftp.suse.com/pub/suse/i386/update/8.0/images/k_psmp-2.4.18-293.i386.rpm
         f689c0895e39ede08ca1c16bcecbdfa2
        ftp://ftp.suse.com/pub/suse/i386/update/8.0/images/k_i386-2.4.18-293.i386.rpm
         6b418c46b6fc224f99bed1c4416284bc
        source rpm(s):
        ftp://ftp.suse.com/pub/suse/i386/update/8.0/zq1/kernel-source-2.4.18.SuSE-293.nosrc.rpm
         9aafaa025c017550763d0189d2badcc6
        Opteron x86_64 Platform:
        SuSE-9.1:
        ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-default-2.6.4-54.3.x86_64.rpm
         783e77719cc89fa4c6e936ad0704b812
        ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-smp-2.6.4-54.3.x86_64.rpm
         141b1be8d3fb310dfeb41e081653ab14
        ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-syms-2.6.4-54.3.x86_64.rpm
         f6459ecda22ec7bdce955d1f838b3091
        patch rpm(s):
        ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-default-2.6.4-54.3.x86_64

- 漏洞信息

7288
Multiple Linux Vendor HbaApiNode Permission Weakness DoS
Denial of Service
Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

2004-05-04 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Linux Kernel HbaApiNode Improper File Permissions Denial of Service Vulnerability
Design Error 10279
No Yes
2004-05-03 12:00:00 2009-07-12 04:07:00
This issue was disclosed in a SuSE advisory.

- 受影响的程序版本

SuSE SUSE Linux Enterprise Server 8
+ Linux kernel 2.4.21
+ Linux kernel 2.4.19
SGI ProPack 3.0
S.u.S.E. Linux Personal 9.0
S.u.S.E. Linux 8.1
RedHat Advanced Workstation for the Itanium Processor 2.1 IA64
Red Hat Fedora Core1
Mandriva Linux Mandrake 10.0 AMD64
Mandriva Linux Mandrake 10.0
Mandriva Linux Mandrake 9.2 amd64
Mandriva Linux Mandrake 9.2
MandrakeSoft Corporate Server 2.1 x86_64
MandrakeSoft Corporate Server 2.1

- 漏洞讨论

A vulnerability has been identified in the SuSE Linux kernel that may allow a local attacker to cause a denial of service condition on a vulnerable system. The issue is reported to be caused by improper file permissions on '/proc/scsi/qla2300/HbaApiNode' file.

SuSE Linux Enterprise Server 8.0, SuSE Linux 8.1 and 9.0 are reported to be affected by this issue as well as other linux operating systems.

According to a RedHat advisory, this issue also affects Fedora Core 1.

Due to a lack of details, further information cannot be provided at the moment. This BID will be updated as more information becomes available.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

SGI has made available Patch 10096 and advisory (20040804-01-U), correcting this and other vulnerabilities for systems running SGI ProPack 3.

Patch 10096 is available from:
ftp://patches.sgi.com/support/free/security/patches/ProPack/3/

Please see the referenced advisory for further details regarding obtaining and applying appropriate updates.

SuSE Linux has released an advisory (SuSE-SA:2004:010) to address various issues in the Linux kernel. Please see the referenced advisory for more information.

Mandrake has issued fixes, listed in advisory MDKSA-2004:050. See referenced advisory for more information.

RedHat has released an advisory (FEDORA-2004-186) to address this and other issues in Fedora Core 1. Please see the referenced advisory for more information.

Mandrake has released advisory MDKSA-2004:066 dealing with this issue. Please see the referenced advisory for more information.

Red Hat has released advisory RHSA-2004:418-05 and RHSA-2004:413-07 and fixes to address this and other issues on Red Hat Linux Enterprise 2.1 and 3.0 platforms. Customers who are affected by this issue are advised to apply the appropriate updates. Customers subscribed to the Red Hat Network may apply the appropriate fixes using the Red Hat Update Agent (up2date). Please see referenced advisory for additional information.

Red Hat has released advisory RHSA-2004:327-09 along with fixes to address this issue for Red Hat Enterprise Linux 2.1 for Itanium processors. Please see the referenced advisory for further information.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站