CVE-2005-1761
CVSS2.1
发布时间 :2005-08-05 00:00:00
修订时间 :2011-03-07 21:22:47
NMCOS    

[原文]Linux kernel 2.6 and 2.4 on the IA64 architecture allows local users to cause a denial of service (kernel crash) via ptrace and the restore_sigcontext function.


[CNNVD]Linux Kernel 拒绝服务漏洞(CNNVD-200508-053)

        IA64架构上的Linux内核2.6和2.4版本允许本地用户借助于ptrace和 restore_sigcontext函数造成拒绝服务(内核崩溃)。

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-20 [输入验证不恰当]

- CPE (受影响的平台与产品)

cpe:/o:suse:suse_linux:9.1SuSE SuSE Linux 9.1
cpe:/a:novell:open_enterprise_server:9
cpe:/o:suse:suse_linux:9.0SuSE SuSE Linux 9.0
cpe:/o:suse:suse_linux:8::enterprise_server
cpe:/o:novell:linux_desktop:9Novell Linux Desktop 9
cpe:/o:suse:suse_linux:9.0::enterprise_server
cpe:/o:suse:suse_linux:9.3SuSE SuSE Linux 9.3
cpe:/o:suse:suse_linux:9.2SuSE SuSE Linux 9.2
cpe:/o:suse:suse_linux:1.0::desktop

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10487Linux kernel 2.6 and 2.4 on the IA64 architecture allows local users to cause a denial of service (kernel crash) via ptrace and the restore_...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1761
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1761
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200508-053
(官方数据源) CNNVD

- 其它链接及资源

http://www.novell.com/linux/security/advisories/2005_44_kernel.html
(VENDOR_ADVISORY)  SUSE  SUSE-SA:2005:044
http://www.vupen.com/english/advisories/2005/1878
(UNKNOWN)  VUPEN  ADV-2005-1878
http://www.securityfocus.com/bid/14051
(UNKNOWN)  BID  14051
http://www.securityfocus.com/archive/1/archive/1/427980/100/0/threaded
(UNKNOWN)  FEDORA  FLSA:157459-3
http://www.redhat.com/support/errata/RHSA-2005-663.html
(UNKNOWN)  REDHAT  RHSA-2005:663
http://www.redhat.com/support/errata/RHSA-2005-551.html
(UNKNOWN)  REDHAT  RHSA-2005:551
http://www.redhat.com/support/errata/RHSA-2005-514.html
(UNKNOWN)  REDHAT  RHSA-2005:514
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.1
(UNKNOWN)  CONFIRM  http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.1
http://www.debian.org/security/2006/dsa-1018
(UNKNOWN)  DEBIAN  DSA-1018
http://www.debian.org/security/2005/dsa-922
(UNKNOWN)  DEBIAN  DSA-922
http://securitytracker.com/id?1014275
(UNKNOWN)  SECTRACK  1014275
http://secunia.com/advisories/19369
(UNKNOWN)  SECUNIA  19369
http://secunia.com/advisories/18056
(UNKNOWN)  SECUNIA  18056
http://secunia.com/advisories/17073
(UNKNOWN)  SECUNIA  17073
http://secunia.com/advisories/17002
(UNKNOWN)  SECUNIA  17002
http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4ea78729b8dbfc400fe165a57b90a394a7275a54
(UNKNOWN)  CONFIRM  http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4ea78729b8dbfc400fe165a57b90a394a7275a54

- 漏洞信息

Linux Kernel 拒绝服务漏洞
低危 访问验证错误
2005-08-05 00:00:00 2005-10-20 00:00:00
本地  
        IA64架构上的Linux内核2.6和2.4版本允许本地用户借助于ptrace和 restore_sigcontext函数造成拒绝服务(内核崩溃)。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        Linux kernel 2.6.11
        Linux patch-2.6.12.1.bz2
        http://www.kernel.org/pub/linux/kernel/v2.6/patch-2.6.12.1.bz2
        Linux kernel 2.6.11 .6
        Linux patch-2.6.12.1.bz2
        http://www.kernel.org/pub/linux/kernel/v2.6/patch-2.6.12.1.bz2
        Linux kernel 2.6.11 -rc2
        Linux patch-2.6.12.1.bz2
        http://www.kernel.org/pub/linux/kernel/v2.6/patch-2.6.12.1.bz2
        Linux kernel 2.6.11 .5
        Linux patch-2.6.12.1.bz2
        http://www.kernel.org/pub/linux/kernel/v2.6/patch-2.6.12.1.bz2
        Linux kernel 2.6.11 -rc3
        Linux patch-2.6.12.1.bz2
        http://www.kernel.org/pub/linux/kernel/v2.6/patch-2.6.12.1.bz2
        Linux kernel 2.6.11 -rc4
        Linux patch-2.6.12.1.bz2
        http://www.kernel.org/pub/linux/kernel/v2.6/patch-2.6.12.1.bz2
        Linux kernel 2.6.11 .11
        Linux patch-2.6.12.1.bz2
        http://www.kernel.org/pub/linux/kernel/v2.6/patch-2.6.12.1.bz2
        Linux kernel 2.6.11 .7
        Linux patch-2.6.12.1.bz2
        http://www.kernel.org/pub/linux/kernel/v2.6/patch-2.6.12.1.bz2
        Linux kernel 2.6.11 .8
        Linux patch-2.6.12.1.bz2
        http://www.kernel.org/pub/linux/kernel/v2.6/patch-2.6.12.1.bz2
        Linux kernel 2.6.12 -rc4
        Linux patch-2.6.12.1.bz2
        http://www.kernel.org/pub/linux/kernel/v2.6/patch-2.6.12.1.bz2
        Linux kernel 2.6.12 -rc1
        Linux patch-2.6.12.1.bz2
        http://www.kernel.org/pub/linux/kernel/v2.6/patch-2.6.12.1.bz2

- 漏洞信息

17479
Linux Kernel ptrace / restore_sigcontext ar.rsc Access Issue
Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-06-20 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Linux Kernel 64 Bit AR-RSC Register Access Validation Vulnerability
Access Validation Error 14051
No Yes
2005-06-24 12:00:00 2007-01-06 01:17:00
The vendor announced this issue.

- 受影响的程序版本

SuSE SUSE Linux Enterprise Server 8
+ Linux kernel 2.4.21
+ Linux kernel 2.4.19
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux ES 3
RedHat Desktop 4.0
RedHat Desktop 3.0
Red Hat Fedora Core4
Red Hat Enterprise Linux AS 4
Red Hat Enterprise Linux AS 3
Linux kernel 2.6.12 -rc4
Linux kernel 2.6.12 -rc1
Linux kernel 2.6.11 .8
Linux kernel 2.6.11 .7
Linux kernel 2.6.11 .6
Linux kernel 2.6.11 .5
Linux kernel 2.6.11 .11
Linux kernel 2.6.11 -rc4
Linux kernel 2.6.11 -rc3
Linux kernel 2.6.11 -rc2
Linux kernel 2.6.11
+ Red Hat Fedora Core4
Linux kernel 2.6.10 rc2
Linux kernel 2.6.10
+ Red Hat Fedora Core3
+ Red Hat Fedora Core2
+ Trustix Secure Linux 3.0
+ Ubuntu Ubuntu Linux 5.0 4 powerpc
+ Ubuntu Ubuntu Linux 5.0 4 i386
+ Ubuntu Ubuntu Linux 5.0 4 amd64
Linux kernel 2.6.9
Linux kernel 2.6.8 rc3
Linux kernel 2.6.8 rc2
Linux kernel 2.6.8 rc1
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Linux kernel 2.6.8
+ S.u.S.E. Linux Personal 9.2 x86_64
+ S.u.S.E. Linux Personal 9.2
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Linux kernel 2.6.7 rc1
Linux kernel 2.6.7
Linux kernel 2.6.6 rc1
Linux kernel 2.6.6
Linux kernel 2.6.5
+ S.u.S.E. Linux Enterprise Server 9
+ S.u.S.E. Linux Personal 9.1 x86_64
+ S.u.S.E. Linux Personal 9.1 x86_64
+ S.u.S.E. Linux Personal 9.1
+ S.u.S.E. Linux Personal 9.1
Linux kernel 2.6.4
Linux kernel 2.6.3
Linux kernel 2.6.2
Linux kernel 2.6.1 -rc2
Linux kernel 2.6.1 -rc1
Linux kernel 2.6.1
Linux kernel 2.6 .10
Linux kernel 2.6 -test9-CVS
Linux kernel 2.6 -test9
Linux kernel 2.6 -test8
Linux kernel 2.6 -test7
Linux kernel 2.6 -test6
Linux kernel 2.6 -test5
Linux kernel 2.6 -test4
Linux kernel 2.6 -test3
Linux kernel 2.6 -test2
Linux kernel 2.6 -test11
Linux kernel 2.6 -test10
Linux kernel 2.6 -test1
Linux kernel 2.6
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
Conectiva Linux 10.0
Linux kernel 2.6.12 .1

- 不受影响的程序版本

Linux kernel 2.6.12 .1

- 漏洞讨论

The Linux Kernel for 64-bit architectures is prone to an access-validation vulnerability. The issue occurs because the software fails to restrict access to the 'ar.rsc' register (register stack engine control register) by the 'restore_sigcontext' function.

Immediate consequences of exploitation would likely be a denial of service; other attacks are also possible.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com

- 解决方案

Please see the referenced vendor advisories for more information.

The vendor has released an update:


Linux kernel 2.6.11

Linux kernel 2.6.11 .6

Linux kernel 2.6.11 -rc2

Linux kernel 2.6.11 .5

Linux kernel 2.6.11 -rc3

Linux kernel 2.6.11 -rc4

Linux kernel 2.6.11 .11

Linux kernel 2.6.11 .7

Linux kernel 2.6.11 .8

Linux kernel 2.6.12 -rc4

Linux kernel 2.6.12 -rc1

Linux kernel 2.6.5

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站