CVE-2005-4886
CVSS7.8
发布时间 :2010-02-26 14:30:00
修订时间 :2010-04-28 00:42:45
NMCOS    

[原文]The selinux_parse_skb_ipv6 function in security/selinux/hooks.c in the Linux kernel before 2.6.12-rc4 allows remote attackers to cause a denial of service (OOPS) via vectors associated with an incorrect call to the ipv6_skip_exthdr function.


[CNNVD]Linux内核 ‘security/selinux/hooks.c’ 拒绝服务漏洞(CNNVD-201002-278)

        Linux Kernel是开源操作系统Linux所使用的内核。
        Linux内核的源代码文件security/selinux/hooks.c中的selinux_parse_skb_ipv6函数存在在拒绝服务漏洞。远程攻击者可以借助与ipv6_skip_exthdr函数的不正确调用相关联的向量,导致拒绝服务攻击。

- CVSS (基础分值)

CVSS分值: 7.8 [严重(HIGH)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-189 [数值错误]

- CPE (受影响的平台与产品)

cpe:/o:linux:linux_kernel:2.6.0:test2Linux Kernel 2.6 test2
cpe:/o:linux:linux_kernel:2.6.1Linux Kernel 2.6.1
cpe:/o:linux:linux_kernel:2.6.4:rc2Linux Kernel 2.6.4 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.10:rc3Linux Kernel 2.6.10 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.7:rc1Linux Kernel 2.6.7 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.6:rc2Linux Kernel 2.6.6 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.0:test9Linux Kernel 2.6 test9
cpe:/o:linux:linux_kernel:2.6.9:rc1Linux Kernel 2.6.9 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.11.6Linux Kernel 2.6.11.6
cpe:/o:linux:linux_kernel:2.6.0:test5Linux Kernel 2.6 test5
cpe:/o:linux:linux_kernel:2.6.9:rc2Linux Kernel 2.6.9 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.5:rc3Linux Kernel 2.6.5 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.6:rc3Linux Kernel 2.6.6 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.9:final
cpe:/o:linux:linux_kernel:2.6.8.1Linux Kernel 2.6.8.1
cpe:/o:linux:linux_kernel:2.6.0:test1Linux Kernel 2.6 test1
cpe:/o:linux:linux_kernel:2.6.4:rc3Linux Kernel 2.6.4 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.11Linux Kernel 2.6.11
cpe:/o:linux:linux_kernel:2.6.3:rc1Linux Kernel 2.6.3 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.0:test11Linux Kernel 2.6 test11
cpe:/o:linux:linux_kernel:2.6.5:rc1Linux Kernel 2.6.5 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.7:rc3Linux Kernel 2.6.7 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.0:test7Linux Kernel 2.6 test7
cpe:/o:linux:linux_kernel:2.6.0:test6Linux Kernel 2.6 test6
cpe:/o:linux:linux_kernel:2.6.11.3Linux Kernel 2.6.11.3
cpe:/o:linux:linux_kernel:2.6.5Linux Kernel 2.6.5
cpe:/o:linux:linux_kernel:2.6.3:rc3Linux Kernel 2.6.3 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.7Linux Kernel 2.6.7
cpe:/o:linux:linux_kernel:2.6.12:rc2Linux Kernel 2.6.12 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.9:rc3Linux Kernel 2.6.9 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.2:rc2Linux Kernel 2.6.2 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.5:rc2Linux Kernel 2.6.5 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.3:rc4Linux Kernel 2.6.3 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.11.9Linux Kernel 2.6.11.9
cpe:/o:linux:linux_kernel:2.6.10:rc1Linux Kernel 2.6.10 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.11.8Linux Kernel 2.6.11.8
cpe:/o:linux:linux_kernel:2.6.3:rc2Linux Kernel 2.6.3 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.9:rc4Linux Kernel 2.6.9 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.4Linux Kernel 2.6.4
cpe:/o:linux:linux_kernel:2.6.4:rc1Linux Kernel 2.6.4 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.2:rc3Linux Kernel 2.6.2 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.10:rc2Linux Kernel 2.6.10 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.11.5Linux Kernel 2.6.11.5
cpe:/o:linux:linux_kernel:2.6.12:rc1Linux Kernel 2.6.12 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.1:rc1Linux Kernel 2.6.1 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.1:rc2Linux Kernel 2.6.1 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.2Linux Kernel 2.6.2
cpe:/o:linux:linux_kernel:2.6.11.2Linux Kernel 2.6.11.2
cpe:/o:linux:linux_kernel:2.6.12:rc3Linux Kernel 2.6.12 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.0:test4Linux Kernel 2.6 test4
cpe:/o:linux:linux_kernel:2.6.0Linux Kernel 2.6.0
cpe:/o:linux:linux_kernel:2.6.2:rc1Linux Kernel 2.6.2 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.11.11Linux Kernel 2.6.11.11
cpe:/o:linux:linux_kernel:2.6.1:rc3Linux Kernel 2.6.1 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.11.4Linux Kernel 2.6.11.4
cpe:/o:linux:linux_kernel:2.6.6:rc1Linux Kernel 2.6.6 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.3Linux Kernel 2.6.3
cpe:/o:linux:linux_kernel:2.6.11.12Linux Kernel 2.6.11.12
cpe:/o:linux:linux_kernel:2.6.11.7Linux Kernel 2.6.11.7
cpe:/o:linux:linux_kernel:2.6.0:test8Linux Kernel 2.6 test8
cpe:/o:linux:linux_kernel:2.6.10Linux Kernel 2.6.10
cpe:/o:linux:linux_kernel:2.6.0:test3Linux Kernel 2.6 test3
cpe:/o:linux:linux_kernel:2.6.8Linux Kernel 2.6.8
cpe:/o:linux:linux_kernel:2.6.0:test10Linux Kernel 2.6 test10
cpe:/o:linux:linux_kernel:2.6.9Linux Kernel 2.6.9
cpe:/o:linux:linux_kernel:2.6.11.1Linux Kernel 2.6.11.1
cpe:/o:linux:linux_kernel:2.6.6Linux Kernel 2.6.6
cpe:/o:linux:linux_kernel:2.6.11.10Linux Kernel 2.6.11.10
cpe:/o:linux:linux_kernel:2.6.7:rc2Linux Kernel 2.6.7 Release Candidate 2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4886
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-4886
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201002-278
(官方数据源) CNNVD

- 其它链接及资源

https://bugzilla.redhat.com/show_bug.cgi?id=160117
(UNKNOWN)  CONFIRM  https://bugzilla.redhat.com/show_bug.cgi?id=160117
http://xforce.iss.net/xforce/xfdb/56614
(UNKNOWN)  XF  kernel-selinuxparseskbipv6-dos(56614)
http://www.openwall.com/lists/oss-security/2010/02/22/3
(UNKNOWN)  MLIST  [oss-security] 20100222 CVE-2005-4886 assigned to old remote oops
http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.12/ChangeLog-2.6.12-rc4
(UNKNOWN)  CONFIRM  http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.12/ChangeLog-2.6.12-rc4
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0d3d077cd4f1154e63a9858e47fe3fb1ad0c03e5
(UNKNOWN)  CONFIRM  http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0d3d077cd4f1154e63a9858e47fe3fb1ad0c03e5

- 漏洞信息

Linux内核 ‘security/selinux/hooks.c’ 拒绝服务漏洞
高危 数字错误
2010-02-26 00:00:00 2010-03-01 00:00:00
远程  
        Linux Kernel是开源操作系统Linux所使用的内核。
        Linux内核的源代码文件security/selinux/hooks.c中的selinux_parse_skb_ipv6函数存在在拒绝服务漏洞。远程攻击者可以借助与ipv6_skip_exthdr函数的不正确调用相关联的向量,导致拒绝服务攻击。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.12/ChangeLog-2.6.12-rc4

- 漏洞信息

63189
Linux Kernel security/selinux/hooks.c selinux_parse_skb_ipv6 Function Remote DoS
Remote / Network Access Denial of Service
Loss of Availability
Vendor Verified

- 漏洞描述

- 时间线

2005-04-25 Unknow
Unknow 2005-04-25

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Linux Kernel 'ipv6_skip_exthdr()' Remote Denial of Service Vulnerability
Design Error 38367
Yes No
2005-04-25 12:00:00 2005-04-25 12:00:00
Herbert Xu

- 受影响的程序版本

RedHat Enterprise Linux WS 4
RedHat Enterprise Linux ES 4.9.z
RedHat Enterprise Linux ES 4.8.z
RedHat Enterprise Linux ES 4.7.z
RedHat Enterprise Linux ES 4.6.z
RedHat Enterprise Linux ES 4.5.z
RedHat Enterprise Linux ES 4
Red Hat Enterprise Linux AS 4.8.z
Red Hat Enterprise Linux AS 4.7.z
Red Hat Enterprise Linux AS 4.6.z
Red Hat Enterprise Linux AS 4.5.z
Red Hat Enterprise Linux AS 4
Linux kernel 2.6.11 .8
Linux kernel 2.6.11 .7
Linux kernel 2.6.11 .6
Linux kernel 2.6.11 .5
Linux kernel 2.6.11 .4
Linux kernel 2.6.11 .12
Linux kernel 2.6.11 .11
Linux kernel 2.6.11 -rc4
Linux kernel 2.6.11 -rc3
Linux kernel 2.6.11 -rc2
Linux kernel 2.6.11
+ Red Hat Fedora Core4
Linux kernel 2.6.11
+ Trustix Secure Enterprise Linux 2.0
+ Trustix Secure Linux 2.2
+ Trustix Secure Linux 2.1
+ Trustix Secure Linux 2.0
Linux kernel 2.6.10 rc2
Linux kernel 2.6.10
+ Red Hat Fedora Core3
+ Red Hat Fedora Core2
+ Trustix Secure Linux 3.0
+ Ubuntu Ubuntu Linux 5.0 4 powerpc
+ Ubuntu Ubuntu Linux 5.0 4 i386
+ Ubuntu Ubuntu Linux 5.0 4 amd64
Linux kernel 2.6.10
+ Trustix Secure Enterprise Linux 2.0
+ Trustix Secure Linux 2.2
+ Trustix Secure Linux 2.1
+ Trustix Secure Linux 2.0
Linux kernel 2.6.9
Linux kernel 2.6.8 rc3
Linux kernel 2.6.8 rc2
Linux kernel 2.6.8 rc1
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Linux kernel 2.6.8
+ S.u.S.E. Linux Personal 9.2 x86_64
+ S.u.S.E. Linux Personal 9.2
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Linux kernel 2.6.7 rc1
Linux kernel 2.6.7
Linux kernel 2.6.6 rc1
Linux kernel 2.6.6
Linux kernel 2.6.5
+ S.u.S.E. Linux Enterprise Server 9
+ S.u.S.E. Linux Personal 9.1 x86_64
+ S.u.S.E. Linux Personal 9.1 x86_64
+ S.u.S.E. Linux Personal 9.1
+ S.u.S.E. Linux Personal 9.1
Linux kernel 2.6.4
Linux kernel 2.6.3
Linux kernel 2.6.2
Linux kernel 2.6.1 -rc2
Linux kernel 2.6.1 -rc1
Linux kernel 2.6.1
Linux kernel 2.6 .10
Linux kernel 2.6 -test9-CVS
Linux kernel 2.6 -test9
Linux kernel 2.6 -test8
Linux kernel 2.6 -test7
Linux kernel 2.6 -test6
Linux kernel 2.6 -test5
Linux kernel 2.6 -test4
Linux kernel 2.6 -test3
Linux kernel 2.6 -test2
Linux kernel 2.6 -test11
Linux kernel 2.6 -test10
Linux kernel 2.6 -test1
Linux kernel 2.6
Linux kernel 2.6.8.1
+ S.u.S.E. Linux Personal 9.2 x86_64
+ S.u.S.E. Linux Personal 9.2
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Linux kernel 2.6.11.4
Linux kernel 2.6.12
+ Trustix Secure Enterprise Linux 2.0
+ Trustix Secure Linux 2.2
+ Trustix Secure Linux 2.1
+ Trustix Secure Linux 2.0

- 不受影响的程序版本

Linux kernel 2.6.12
+ Trustix Secure Enterprise Linux 2.0
+ Trustix Secure Linux 2.2
+ Trustix Secure Linux 2.1
+ Trustix Secure Linux 2.0

- 漏洞讨论

The Linux kernel is prone to a remote denial-of-service vulnerability.

Attackers can exploit this issue to cause a kernel crash, denying service to legitimate users.

Versions prior to the Linux kernel 2.6.12 are vulnerable.

- 漏洞利用

Currently we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

Updates are available. Please see the references for more information.


Linux kernel 2.6.11.4

Linux kernel 2.6.8.1

Linux kernel 2.6 -test6

Linux kernel 2.6 -test1

Linux kernel 2.6 -test4

Linux kernel 2.6 -test7

Linux kernel 2.6 -test9

Linux kernel 2.6 -test2

Linux kernel 2.6 -test8

Linux kernel 2.6 -test11

Linux kernel 2.6 -test10

Linux kernel 2.6 -test9-CVS

Linux kernel 2.6

Linux kernel 2.6 -test3

Linux kernel 2.6 .10

Linux kernel 2.6 -test5

Linux kernel 2.6.1 -rc1

Linux kernel 2.6.1 -rc2

Linux kernel 2.6.1

Linux kernel 2.6.10

Linux kernel 2.6.10 rc2

Linux kernel 2.6.10

Linux kernel 2.6.11 -rc3

Linux kernel 2.6.11

Linux kernel 2.6.11 -rc4

Linux kernel 2.6.11 .6

Linux kernel 2.6.11 .11

Linux kernel 2.6.11

Linux kernel 2.6.11 .4

Linux kernel 2.6.11 .12

Linux kernel 2.6.11 .7

Linux kernel 2.6.11 -rc2

Linux kernel 2.6.11 .5

Linux kernel 2.6.11 .8

Linux kernel 2.6.2

Linux kernel 2.6.3

Linux kernel 2.6.4

Linux kernel 2.6.5

Linux kernel 2.6.6 rc1

Linux kernel 2.6.6

Linux kernel 2.6.7

Linux kernel 2.6.7 rc1

Linux kernel 2.6.8 rc1

Linux kernel 2.6.8

Linux kernel 2.6.8 rc3

Linux kernel 2.6.8 rc2

Linux kernel 2.6.9

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站