CVE-2004-2660
CVSS4.9
发布时间 :2004-12-31 00:00:00
修订时间 :2010-08-21 00:24:58
NMCOS    

[原文]Memory leak in direct-io.c in Linux kernel 2.6.x before 2.6.10 allows local users to cause a denial of service (memory consumption) via certain O_DIRECT (direct IO) write requests.


[CNNVD]Linux Kernel Direct-IO.C本地服务拒绝漏洞(CNNVD-200412-661)

        Linux内核2.6.10之前2.6.x版本中的direct-io.c存在内存泄露漏洞。本地用户可以借助某些O_DIRECT(直接IO)写请求导致服务拒绝(内存耗尽)。

- CVSS (基础分值)

CVSS分值: 4.9 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:linux:linux_kernel:2.6.0:test2Linux Kernel 2.6 test2
cpe:/o:linux:linux_kernel:2.6.8.1.5::power4
cpe:/o:linux:linux_kernel:2.6.1Linux Kernel 2.6.1
cpe:/o:linux:linux_kernel:2.6.4:rc2Linux Kernel 2.6.4 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.7:rc1Linux Kernel 2.6.7 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.6:rc2Linux Kernel 2.6.6 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.9:rc1Linux Kernel 2.6.9 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.0:test9Linux Kernel 2.6 test9
cpe:/o:linux:linux_kernel:2.6.8.1.5::amd64_k8
cpe:/o:linux:linux_kernel:2.6.9:rc2Linux Kernel 2.6.9 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.0:test5Linux Kernel 2.6 test5
cpe:/o:linux:linux_kernel:2.6.8.1.5::686
cpe:/o:linux:linux_kernel:2.6.5:rc3Linux Kernel 2.6.5 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.6:rc3Linux Kernel 2.6.6 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.9:final
cpe:/o:linux:linux_kernel:2.6.8.1Linux Kernel 2.6.8.1
cpe:/o:linux:linux_kernel:2.6.0:test1Linux Kernel 2.6 test1
cpe:/o:linux:linux_kernel:2.6.4:rc3Linux Kernel 2.6.4 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.3:rc1Linux Kernel 2.6.3 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.0:test11Linux Kernel 2.6 test11
cpe:/o:linux:linux_kernel:2.6.9:2.6.20
cpe:/o:linux:linux_kernel:2.6.5:rc1Linux Kernel 2.6.5 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.7:rc3Linux Kernel 2.6.7 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.0:test7Linux Kernel 2.6 test7
cpe:/o:linux:linux_kernel:2.6.0:test6Linux Kernel 2.6 test6
cpe:/o:linux:linux_kernel:2.6.8.1.5::k7
cpe:/o:linux:linux_kernel:2.6.8.1.5::amd64_k8_smp
cpe:/o:linux:linux_kernel:2.6.8.1.5::686_smp
cpe:/o:linux:linux_kernel:2.6.8.1.5::powerpc
cpe:/o:linux:linux_kernel:2.6.3:rc3Linux Kernel 2.6.3 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.5Linux Kernel 2.6.5
cpe:/o:linux:linux_kernel:2.6.7Linux Kernel 2.6.7
cpe:/o:linux:linux_kernel:2.6.9:rc3Linux Kernel 2.6.9 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.2:rc2Linux Kernel 2.6.2 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.5:rc2Linux Kernel 2.6.5 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6_test9_cvs
cpe:/o:linux:linux_kernel:2.6.3:rc4Linux Kernel 2.6.3 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.8.1.5::amd64_xeon
cpe:/o:linux:linux_kernel:2.6.8.1.5::amd64
cpe:/o:linux:linux_kernel:2.6.8.1.5::k7_smp
cpe:/o:linux:linux_kernel:2.6.3:rc2Linux Kernel 2.6.3 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.0::64-bit_x86
cpe:/o:linux:linux_kernel:2.6.9:rc4Linux Kernel 2.6.9 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.4Linux Kernel 2.6.4
cpe:/o:linux:linux_kernel:2.6.4:rc1Linux Kernel 2.6.4 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.8.1.5::386
cpe:/o:linux:linux_kernel:2.6.8:rc3Linux Kernel 2.6.8 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.8:rc2Linux Kernel 2.6.8 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.8.1.5::power3_smp
cpe:/o:linux:linux_kernel:2.6.2:rc3Linux Kernel 2.6.2 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.8.1.5::powerpc_smp
cpe:/o:linux:linux_kernel:2.6.8:rc4Linux Kernel 2.6.8 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.0::itanium_ia64_montecito
cpe:/o:linux:linux_kernel:2.6.8.1.5::power4_smp
cpe:/o:linux:linux_kernel:2.6.1:rc1Linux Kernel 2.6.1 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.8.1.5
cpe:/o:linux:linux_kernel:2.6.1:rc2Linux Kernel 2.6.1 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.2Linux Kernel 2.6.2
cpe:/o:linux:linux_kernel:2.6.0:test4Linux Kernel 2.6 test4
cpe:/o:linux:linux_kernel:2.6.2:rc1Linux Kernel 2.6.2 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.0Linux Kernel 2.6.0
cpe:/o:linux:linux_kernel:2.6.8:rc1Linux Kernel 2.6.8 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.1:rc3Linux Kernel 2.6.1 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.6:rc1Linux Kernel 2.6.6 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.3Linux Kernel 2.6.3
cpe:/o:linux:linux_kernel:2.6.0:test8Linux Kernel 2.6 test8
cpe:/o:linux:linux_kernel:2.6.0:test3Linux Kernel 2.6 test3
cpe:/o:linux:linux_kernel:2.6.8Linux Kernel 2.6.8
cpe:/o:linux:linux_kernel:2.6.0:test10Linux Kernel 2.6 test10
cpe:/o:linux:linux_kernel:2.6.6Linux Kernel 2.6.6
cpe:/o:linux:linux_kernel:2.6.8.1.5::power3
cpe:/o:linux:linux_kernel:2.6.7:rc2Linux Kernel 2.6.7 Release Candidate 2

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10165Memory leak in direct-io.c in Linux kernel 2.6.x before 2.6.10 allows local users to cause a denial of service (memory consumption) via cert...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2660
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-2660
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200412-661
(官方数据源) CNNVD

- 其它链接及资源

http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.10
(PATCH)  CONFIRM  http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.10
http://linux.bkbits.net:8080/linux-2.6/cset@4182a613oVsK0-8eCWpyYFrUf8rhLA
(PATCH)  CONFIRM  http://linux.bkbits.net:8080/linux-2.6/cset@4182a613oVsK0-8eCWpyYFrUf8rhLA
http://www.securityfocus.com/bid/19665
(UNKNOWN)  BID  19665
http://www.redhat.com/support/errata/RHSA-2006-0617.html
(UNKNOWN)  REDHAT  RHSA-2006:0617
http://www.debian.org/security/2006/dsa-1184
(UNKNOWN)  DEBIAN  DSA-1184
http://support.avaya.com/elmodocs2/security/ASA-2006-203.htm
(UNKNOWN)  CONFIRM  http://support.avaya.com/elmodocs2/security/ASA-2006-203.htm
http://secunia.com/advisories/22174
(UNKNOWN)  SECUNIA  22174
http://secunia.com/advisories/22093
(UNKNOWN)  SECUNIA  22093
http://secunia.com/advisories/21605
(UNKNOWN)  SECUNIA  21605

- 漏洞信息

Linux Kernel Direct-IO.C本地服务拒绝漏洞
中危 设计错误
2004-12-31 00:00:00 2006-05-30 00:00:00
本地  
        Linux内核2.6.10之前2.6.x版本中的direct-io.c存在内存泄露漏洞。本地用户可以借助某些O_DIRECT(直接IO)写请求导致服务拒绝(内存耗尽)。

- 公告与补丁

        Linux kernel version 2.6.10 is available to address this issue.
        Please see the references for more information and vendor advisories.
        Linux kernel 2.6 -test6
        
        Linux kernel 2.6 -test1
        
        Linux kernel 2.6 -test4
        
        Linux kernel 2.6 -test7
        
        Linux kernel 2.6 -test9
        
        Linux kernel 2.6 -test2
        
        Linux kernel 2.6 -test8
        
        Linux kernel 2.6 -test11
        
        Linux kernel 2.6 -test10
        
        Linux kernel 2.6 -test9-CVS
        
        Linux kernel 2.6
        
        Linux kernel 2.6 -test3
        
        Linux kernel 2.6 .10
        
        Linux kernel 2.6 -test5
        
        Linux kernel 2.6.1 -rc1
        
        Linux kernel 2.6.1 -rc2
        
        Linux kernel 2.6.1
        

- 漏洞信息

26552
Linux Kernel O_DIRECT Local Memory Leak
Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2004-10-29 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Linux Kernel Direct-IO.C Local Denial of Service Vulnerability
Design Error 19665
No Yes
2006-08-22 12:00:00 2006-12-18 09:03:00
iwamoto is credited with discovering this issue.

- 受影响的程序版本

RedHat Enterprise Linux WS 4
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux Desktop version 4
Red Hat Enterprise Linux AS 4
Linux kernel 2.6.1 -rc2
Linux kernel 2.6.1 -rc1
Linux kernel 2.6.1
Linux kernel 2.6 .10
Linux kernel 2.6 -test9-CVS
Linux kernel 2.6 -test9
Linux kernel 2.6 -test8
Linux kernel 2.6 -test7
Linux kernel 2.6 -test6
Linux kernel 2.6 -test5
Linux kernel 2.6 -test4
Linux kernel 2.6 -test3
Linux kernel 2.6 -test2
Linux kernel 2.6 -test11
Linux kernel 2.6 -test10
Linux kernel 2.6 -test1
Linux kernel 2.6
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
Avaya S8710 CM 3.1
Avaya S8700 CM 3.1
Avaya S8500 CM 3.1
Avaya S8300 CM 3.1
Linux kernel 2.6.10
+ Red Hat Fedora Core3
+ Red Hat Fedora Core2
+ Trustix Secure Linux 3.0
+ Ubuntu Ubuntu Linux 5.0 4 powerpc
+ Ubuntu Ubuntu Linux 5.0 4 i386
+ Ubuntu Ubuntu Linux 5.0 4 amd64

- 不受影响的程序版本

Linux kernel 2.6.10
+ Red Hat Fedora Core3
+ Red Hat Fedora Core2
+ Trustix Secure Linux 3.0
+ Ubuntu Ubuntu Linux 5.0 4 powerpc
+ Ubuntu Ubuntu Linux 5.0 4 i386
+ Ubuntu Ubuntu Linux 5.0 4 amd64

- 漏洞讨论

The Linux kernel is prone to a local denial-of-service vulnerability. This issue is due to a design error in the direct IO driver.

This vulnerability allows local users to cause a kernel panic, denying further service to legitimate users.

This issue affects the Linux kernel 2.6 series prior to 2.6.10.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com

- 解决方案

Linux kernel version 2.6.10 is available to address this issue.

Please see the references for more information and vendor advisories.


Linux kernel 2.6 -test6

Linux kernel 2.6 -test1

Linux kernel 2.6 -test4

Linux kernel 2.6 -test7

Linux kernel 2.6 -test9

Linux kernel 2.6 -test2

Linux kernel 2.6 -test8

Linux kernel 2.6 -test11

Linux kernel 2.6 -test10

Linux kernel 2.6 -test9-CVS

Linux kernel 2.6

Linux kernel 2.6 -test3

Linux kernel 2.6 .10

Linux kernel 2.6 -test5

Linux kernel 2.6.1 -rc1

Linux kernel 2.6.1 -rc2

Linux kernel 2.6.1

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站