CVE-2005-0210
CVSS4.9
发布时间 :2005-05-02 00:00:00
修订时间 :2016-11-18 21:59:22
NMCOS    

[原文]Netfilter in the Linux kernel 2.6.8.1 allows local users to cause a denial of service (memory consumption) via certain packet fragments that are reassembled twice, which causes a data structure to be allocated twice.


[CNNVD]Linux Kernel本地拒绝服务漏洞(CNNVD-200505-505)

        Linux Kernel是开放源代码操作系统Linux的内核。
        Linux Kernel的Netfilter组件代码中存在的内存泄漏,本地攻击攻击者可能利用此漏洞对致Linux Kernel执行拒绝服务攻击。

- CVSS (基础分值)

CVSS分值: 4.9 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-399 [资源管理错误]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10275The Linux kernel before 2.6.11 on the Itanium IA64 platform has certain "ptrace corner cases" that allow local users to cause a denial of se...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0210
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0210
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-505
(官方数据源) CNNVD

- 其它链接及资源

http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000945
(PATCH)  CONECTIVA  CLA-2005:945
http://marc.info/?l=bugtraq&m=111091402626556&w=2
(UNKNOWN)  BUGTRAQ  20050315 [USN-95-1] Linux kernel vulnerabilities
http://rhn.redhat.com/errata/RHSA-2005-366.html
(UNKNOWN)  REDHAT  RHSA-2005:366
http://rhn.redhat.com/errata/RHSA-2005-663.html
(UNKNOWN)  REDHAT  RHSA-2005:663
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
(UNKNOWN)  MANDRAKE  MDKSA-2005:218
http://www.novell.com/linux/security/advisories/2005_18_kernel.html
(VENDOR_ADVISORY)  SUSE  SUSE-SA:2005:018
http://www.securityfocus.com/bid/12816
(UNKNOWN)  BID  12816
http://www.vupen.com/english/advisories/2005/1878
(UNKNOWN)  VUPEN  ADV-2005-1878

- 漏洞信息

Linux Kernel本地拒绝服务漏洞
中危 设计错误
2005-05-02 00:00:00 2005-10-20 00:00:00
本地  
        Linux Kernel是开放源代码操作系统Linux的内核。
        Linux Kernel的Netfilter组件代码中存在的内存泄漏,本地攻击攻击者可能利用此漏洞对致Linux Kernel执行拒绝服务攻击。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        Linux kernel 2.6.4
        SuSE kernel-bigsmp-2.6.5-7.151.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-bigsmp-2.6 .5-7.151.i586.rpm
        SuSE kernel-default-2.6.5-7.151.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-default-2. 6.5-7.151.i586.rpm
        SuSE kernel-default-2.6.5-7.151.x86_64.rpm
        ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-defaul t-2.6.5-7.151.x86_64.rpm
        SuSE kernel-docs-2.6.5-7.151.noarch.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/noarch/kernel-docs-2.6 .5-7.151.noarch.rpm
        SuSE kernel-smp-2.6.5-7.151.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-smp-2.6.5- 7.151.i586.rpm
        SuSE kernel-smp-2.6.5-7.151.x86_64.rpm
        ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-smp-2. 6.5-7.151.x86_64.rpm
        SuSE kernel-source-2.6.5-7.151.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-source-2.6 .5-7.151.i586.rpm
        SuSE kernel-source-2.6.5-7.151.x86_64.rpm
        ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-source -2.6.5-7.151.x86_64.rpm
        SuSE kernel-syms-2.6.5-7.151.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-syms-2.6.5 -7.151.i586.rpm
        SuSE kernel-syms-2.6.5-7.151.x86_64.rpm
        ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-syms-2 .6.5-7.151.x86_64.rpm
        SuSE ltmodem-2.6.2-38.14.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/ltmodem-2.6.2-38. 14.i586.rpm
        Linux kernel 2.6.5
        Conectiva drbd-utils-0.7.10-71689U10_2cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/drbd-utils-0.7.10-71689U10 _2cl.i386.rpm
        Conectiva drbd-utils-heartbeat-0.7.10-71689U10_2cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/drbd-utils-heartbeat-0.7.1 0-71689U10_2cl.i386.rpm
        Conectiva hsfmodem-progs-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/hsfmodem-progs-2.6.11.7203 2U10_16cl.7.18.00.03full-63167U10_5cl.i386.rpm
        Conectiva kernel26-2.6.11-72032U10_16cl.athlon.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-2.6.11-72032U10_1 6cl.athlon.rpm
        Conectiva kernel26-2.6.11-72032U10_16cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-2.6.11-72032U10_1 6cl.i386.rpm
        Conectiva kernel26-2.6.11-72032U10_16cl.i586.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-2.6.11-72032U10_1 6cl.i586.rpm
        Conectiva kernel26-2.6.11-72032U10_16cl.i686.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-2.6.11-72032U10_1 6cl.i686.rpm
        Conectiva kernel26-2.6.11-72032U10_16cl.pentium4.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-2.6.11-72032U10_1 6cl.pentium4.rpm
        Conectiva kernel26-BOOT-2.6.11-72032U10_16cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-2.6.11-72032 U10_16cl.i386.rpm
        Conectiva kernel26-BOOT-module-drbd-2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-module-drbd- 2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.i386.rpm
        Conectiva kernel26-BOOT-module-hsfmodem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-module-hsfmo dem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.i386.rpm
        Conectiva kernel26-BOOT-module-madwifi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-module-madwi fi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.i386.rpm
        Conectiva kernel26-BOOT-module-ndiswrapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-module-ndisw rapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.i386.rpm
        Conectiva kernel26-BOOT-module-nvidia-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-module-nvidi a-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.i386.rpm
        Conectiva kernel26-BOOT-module-slmodem-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-m

- 漏洞信息

14966
Linux Kernel Netfilter Memory Leak DoS
Denial of Service
Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-03-15 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Linux Kernel Netfilter Memory Leak Local Denial of Service Vulnerability
Design Error 12816
No Yes
2005-03-15 12:00:00 2009-07-12 10:56:00
Discovery is credited to Herbert Xu.

- 受影响的程序版本

RedHat Enterprise Linux WS 4
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux ES 3
RedHat Desktop 4.0
RedHat Desktop 3.0
Red Hat Fedora Core3
Red Hat Fedora Core2
Red Hat Enterprise Linux AS 4
Red Hat Enterprise Linux AS 3
Mandriva Linux Mandrake 10.1 x86_64
Mandriva Linux Mandrake 10.1
MandrakeSoft Multi Network Firewall 2.0
MandrakeSoft Corporate Server 3.0 x86_64
MandrakeSoft Corporate Server 3.0
Linux kernel 2.6.8 rc3
Linux kernel 2.6.8 rc2
Linux kernel 2.6.8 rc1
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Linux kernel 2.6.8
+ S.u.S.E. Linux Personal 9.2 x86_64
+ S.u.S.E. Linux Personal 9.2
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Linux kernel 2.6.7 rc1
Linux kernel 2.6.7
Linux kernel 2.6.6 rc1
Linux kernel 2.6.6
Linux kernel 2.6.5
+ S.u.S.E. Linux Enterprise Server 9
+ S.u.S.E. Linux Personal 9.1 x86_64
+ S.u.S.E. Linux Personal 9.1 x86_64
+ S.u.S.E. Linux Personal 9.1
+ S.u.S.E. Linux Personal 9.1
Linux kernel 2.6.4
Linux kernel 2.6.3
Linux kernel 2.6.2
Linux kernel 2.6.1 -rc2
Linux kernel 2.6.1 -rc1
Linux kernel 2.6.1
Linux kernel 2.6 .10
Linux kernel 2.6 -test9-CVS
Linux kernel 2.6 -test9
Linux kernel 2.6 -test8
Linux kernel 2.6 -test7
Linux kernel 2.6 -test6
Linux kernel 2.6 -test5
Linux kernel 2.6 -test4
Linux kernel 2.6 -test3
Linux kernel 2.6 -test2
Linux kernel 2.6 -test11
Linux kernel 2.6 -test10
Linux kernel 2.6 -test1
Linux kernel 2.6
Conectiva Linux 10.0

- 漏洞讨论

Linux Kernel is reported prone to a local denial of service vulnerability due to a memory leak in Netfilter code. This issue can allow an attacker to crash a computer and deny service to legitimate users.

It is not known whether this issue allows for remote exploitation.

Linux Kernel 2.6.8 was reported vulnerable, however, it is possible that subsequent versions are affected as well.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Conectiva has released a security advisory (CLA-2005:945) and fixes to address this and other issues. Please see the referenced advisory for further information regarding obtaining and applying appropriate updates.

RedHat has released an advisory (FEDORA-2005-262) and fixes for Fedora Core 2. Please see the referenced advisory for further information.

Ubuntu has released advisory USN-95-1 to address this issue. Please see the referenced advisory for more information.

SuSE Linux has released advisory SUSE-SA:2005:018 along with fixes dealing with this and other issues. Please see the referenced advisory for more information.

RedHat has released advisory FEDORA-2005-313 to address this issue for Fedora Core 3. Please see the referenced advisory for further information.

Red Hat has released advisory RHSA-2005:366-21 to address this issue. Please see the advisory in Web references for more information.

RedHat Linux has released advisory RHSA-2005:663-19 to address this, and other issues in RedHat Enterprise Linux 3 operating systems. Please see the referenced advisory for further information.

Mandriva has released advisory MDKSA-2005:218 to address various issues affecting the Linux Kernel. Please see the referenced advisory for more information.

Mandriva has released advisory MDKSA-2005:219 to address various issues affecting the Linux Kernel in Mandrake Linux 10.1. Please see the referenced advisory for more information.


Linux kernel 2.6.4

Linux kernel 2.6.5

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站