CVE-2005-0449
CVSS7.1
发布时间 :2005-05-02 00:00:00
修订时间 :2010-08-21 00:26:09
NMCO    

[原文]The netfilter/iptables module in Linux before 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) or bypass firewall rules via crafted packets, which are not properly handled by the skb_checksum_help function.


[CNNVD]Linux内核多个漏洞(CNNVD-200505-685)

        Linux的2.6.8.1之前版本中的netfilter/iptables模块,使得远程攻击者可以通过skb_checksum_help函数未正确处理的特制的包来发起拒绝服务攻击(内核崩溃)或绕过防火墙规则。

- CVSS (基础分值)

CVSS分值: 7.1 [严重(HIGH)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-20 [输入验证不恰当]

- CPE (受影响的平台与产品)

cpe:/o:linux:linux_kernel:2.6.3Linux Kernel 2.6.3
cpe:/o:linux:linux_kernel:2.6.1Linux Kernel 2.6.1
cpe:/o:linux:linux_kernel:2.6.8Linux Kernel 2.6.8
cpe:/o:linux:linux_kernel:2.6.5Linux Kernel 2.6.5
cpe:/o:linux:linux_kernel:2.6.2Linux Kernel 2.6.2
cpe:/o:linux:linux_kernel:2.6.7Linux Kernel 2.6.7
cpe:/o:linux:linux_kernel:2.6.0Linux Kernel 2.6.0
cpe:/o:linux:linux_kernel:2.6.6Linux Kernel 2.6.6
cpe:/o:linux:linux_kernel:2.6.4Linux Kernel 2.6.4

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10753The netfilter/iptables module in Linux before 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) or bypass firewall...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0449
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0449
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-685
(官方数据源) CNNVD

- 其它链接及资源

http://www.redhat.com/support/errata/RHSA-2005-284.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2005:284
http://www.redhat.com/support/errata/RHSA-2005-283.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2005:283
http://www.novell.com/linux/security/advisories/2005_18_kernel.html
(VENDOR_ADVISORY)  SUSE  SUSE-SA:2005:018
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000945
(PATCH)  CONECTIVA  CLA-2005:945
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532
(UNKNOWN)  FEDORA  FLSA:152532
http://www.ubuntulinux.org/support/documentation/usn/usn-82-1
(UNKNOWN)  UBUNTU  USN-82-1
http://www.securityfocus.com/bid/12598
(UNKNOWN)  BID  12598
http://www.redhat.com/support/errata/RHSA-2005-366.html
(UNKNOWN)  REDHAT  RHSA-2005:366
http://www.redhat.com/support/errata/RHSA-2005-293.html
(UNKNOWN)  REDHAT  RHSA-2005:293
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
(UNKNOWN)  MANDRAKE  MDKSA-2005:218
http://www.debian.org/security/2006/dsa-1018
(UNKNOWN)  DEBIAN  DSA-1018
http://www.debian.org/security/2006/dsa-1017
(UNKNOWN)  DEBIAN  DSA-1017
http://secunia.com/advisories/19607
(VENDOR_ADVISORY)  SECUNIA  19607
http://secunia.com/advisories/19374
(VENDOR_ADVISORY)  SECUNIA  19374
http://secunia.com/advisories/19369
(VENDOR_ADVISORY)  SECUNIA  19369
http://oss.sgi.com/archives/netdev/2005-01/msg01036.html
(VENDOR_ADVISORY)  MLIST  [netdev] 20050124 Re: skb_checksum_help
ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
(UNKNOWN)  SGI  20060402-01-U

- 漏洞信息

Linux内核多个漏洞
高危 资料不足
2005-05-02 00:00:00 2005-10-20 00:00:00
本地  
        Linux的2.6.8.1之前版本中的netfilter/iptables模块,使得远程攻击者可以通过skb_checksum_help函数未正确处理的特制的包来发起拒绝服务攻击(内核崩溃)或绕过防火墙规则。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        RedHat Fedora Core1
        RedHat kernel-2.4.22-1.2199.5.legacy.nptl.athlon.rpm
        Fedora Core 1:
        http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-2.4.22-1 .2199.5.legacy.nptl.athlon.rpm
        RedHat kernel-2.4.22-1.2199.5.legacy.nptl.i586.rpm
        Fedora Core 1:
        http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-2.4.22-1 .2199.5.legacy.nptl.i586.rpm
        RedHat kernel-2.4.22-1.2199.5.legacy.nptl.i686.rpm
        Fedora Core 1:
        http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-2.4.22-1 .2199.5.legacy.nptl.i686.rpm
        RedHat kernel-BOOT-2.4.22-1.2199.5.legacy.nptl.i386.rpm
        Fedora Core 1:
        http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-BOOT-2.4 .22-1.2199.5.legacy.nptl.i386.rpm
        RedHat kernel-doc-2.4.22-1.2199.5.legacy.nptl.i386.rpm
        Fedora Core 1:
        http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-doc-2.4. 22-1.2199.5.legacy.nptl.i386.rpm
        RedHat kernel-smp-2.4.22-1.2199.5.legacy.nptl.athlon.rpm
        Fedora Core 1:
        http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-smp-2.4. 22-1.2199.5.legacy.nptl.athlon.rpm
        RedHat kernel-smp-2.4.22-1.2199.5.legacy.nptl.i586.rpm
        Fedora Core 1:
        http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-smp-2.4. 22-1.2199.5.legacy.nptl.i586.rpm
        RedHat kernel-smp-2.4.22-1.2199.5.legacy.nptl.i686.rpm
        Fedora Core 1:
        http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-smp-2.4. 22-1.2199.5.legacy.nptl.i686.rpm
        RedHat kernel-source-2.4.22-1.2199.5.legacy.nptl.i386.rpm
        Fedora Core 1:
        http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-source-2 .4.22-1.2199.5.legacy.nptl.i386.rpm
        Linux kernel 2.6
        Debian kernel-headers-2.6-amd64-generic_103sarge1_amd64.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64 /kernel-headers-2.6-amd64-generic_103sarge1_amd64.deb
        Debian kernel-headers-2.6-amd64-k8-smp_103sarge1_amd64.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64 /kernel-headers-2.6-amd64-k8-smp_103sarge1_amd64.deb
        Debian kernel-headers-2.6-amd64-k8_103sarge1_amd64.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64 /kernel-headers-2.6-amd64-k8_103sarge1_amd64.deb
        Debian kernel-headers-2.6-em64t-p4-smp_103sarge1_amd64.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64 /kernel-headers-2.6-em64t-p4-smp_103sarge1_amd64.deb
        Debian kernel-headers-2.6-em64t-p4_103sarge1_amd64.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64 /kernel-headers-2.6-em64t-p4_103sarge1_amd64.deb
        Debian kernel-headers-2.6-generic_101sarge1_alpha.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha /kernel-headers-2.6-generic_101sarge1_alpha.deb
        Debian kernel-headers-2.6-itanium-smp_2.6.8-14sarge2_ia64.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64 /kernel-headers-2.6-itanium-smp_2.6.8-14sarge2_ia64.deb
        Debian kernel-headers-2.6-itanium_2.6.8-14sarge2_ia64.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64 /kernel-headers-2.6-itanium_2.6.8-14sarge2_ia64.deb
        Debian kernel-headers-2.6-smp_101sarge1_alpha.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha /kernel-headers-2.6-smp_101sarge1_alpha.deb
        Debian kernel-headers-2.6-sparc32_101sarge1_sparc.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc /kernel-headers-2.6-sparc32_101sarge1_sparc.deb
        Debian kernel-headers-2.6-sparc64-smp_101sarge1_sparc.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc /kernel-headers-2.6-sparc64-smp_101sarge1_sparc.deb
        Debian kernel-headers-2.6-sparc64_101sarge1_sparc.deb
        Debian GNU/Linux 3.1 alias

- 漏洞信息

13850
Linux IPTables/Netfilter Module Crafted Packet Bypass

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-02-15 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站