Уязвимость BDU:2015-02276

Дата: 01.01.2015. Автор: ФСТЭК России. Категории: Уязвимости

Идентификатор: BDU:2015-02276.

Наименование уязвимости: Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации.

Описание уязвимости: Множественные уязвимости пакета kernel-headers-2.6.8-3-mckinley операционной системы Debian GNU/Linux, эксплуатация которых может привести к нарушению конфиденциальности, целостности и доступности защищаемой информации. Эксплуатация уязвимостей может быть осуществлена удаленно
Уязвимое ПО: Операционная система Debian GNU/Linux до 3.1 |

Наименование ОС и тип аппаратной платформы:

CVSS 2.0: AV:N/AC:L/Au:N/C:C/I:C/A:C
Уровень опасности уязвимости: Критический уровень опасности (базовая оценка CVSS 2.0 составляет 10)

Возможные меры по устранению:
Проблема может быть решена обновлением операционной системы до следующих версий пакетов в зависимости от архитектуры:
Debian GNU/Linux 3.1:
ppc:
kernel-headers — 102sarge1
kernel-headers-2.4 — 102sarge1
kernel-headers-2.6 — 102sarge1
kernel-image-2.4-powerpc — 102sarge1
kernel-image-2.4-powerpc-smp — 102sarge1
kernel-image-2.6-power3 — 102sarge1
kernel-image-2.6-power3-smp — 102sarge1
kernel-image-2.6-power4 — 102sarge1
kernel-image-2.6-power4-smp — 102sarge1
kernel-image-2.6-powerpc — 102sarge1
kernel-image-2.6-powerpc-smp — 102sarge1
kernel-image-power3 — 102sarge1
kernel-image-power3-smp — 102sarge1
kernel-image-power4 — 102sarge1
kernel-image-power4-smp — 102sarge1
kernel-image-powerpc — 102sarge1
kernel-image-powerpc-smp — 102sarge1
kernel-build-2.6.8-3-power3 — 2.6.8-12sarge2
kernel-build-2.6.8-3-power3-smp — 2.6.8-12sarge2
kernel-build-2.6.8-3-power4 — 2.6.8-12sarge2
kernel-build-2.6.8-3-power4-smp — 2.6.8-12sarge2
kernel-build-2.6.8-3-powerpc — 2.6.8-12sarge2
kernel-build-2.6.8-3-powerpc-smp — 2.6.8-12sarge2
kernel-build-2.6.8-power3 — 2.6.8-12sarge1
kernel-build-2.6.8-power3-smp — 2.6.8-12sarge1
kernel-build-2.6.8-power4 — 2.6.8-12sarge1
kernel-build-2.6.8-power4-smp — 2.6.8-12sarge1
kernel-build-2.6.8-powerpc — 2.6.8-12sarge1
kernel-build-2.6.8-powerpc-smp — 2.6.8-12sarge1
kernel-headers-2.6.8 — 2.6.8-12sarge1
kernel-headers-2.6.8-3 — 2.6.8-12sarge2
kernel-image-2.6.8-3-power3 — 2.6.8-12sarge2
kernel-image-2.6.8-3-power3-smp — 2.6.8-12sarge2
kernel-image-2.6.8-3-power4 — 2.6.8-12sarge2
kernel-image-2.6.8-3-power4-smp — 2.6.8-12sarge2
kernel-image-2.6.8-3-powerpc — 2.6.8-12sarge2
kernel-image-2.6.8-3-powerpc-smp — 2.6.8-12sarge2
kernel-image-2.6.8-power3 — 2.6.8-12sarge1
kernel-image-2.6.8-power3-smp — 2.6.8-12sarge1
kernel-image-2.6.8-power4 — 2.6.8-12sarge1
kernel-image-2.6.8-power4-smp — 2.6.8-12sarge1
kernel-image-2.6.8-powerpc — 2.6.8-12sarge1
kernel-image-2.6.8-powerpc-smp — 2.6.8-12sarge1
mol-modules-2.6.8-3-powerpc — 0.9.70+2.6.8+12sarge1
mol-modules-2.6.8-3-powerpc-smp — 0.9.70+2.6.8+12sarge1
s390x:
kernel-headers-2.6.8-2 — 2.6.8-5sarge1
kernel-headers-2.6.8-3 — 2.6.8-5sarge2
kernel-image-2.6.8-2-s390 — 2.6.8-5sarge1
kernel-image-2.6.8-2-s390-tape — 2.6.8-5sarge1
kernel-image-2.6.8-2-s390x — 2.6.8-5sarge1
kernel-image-2.6.8-3-s390 — 2.6.8-5sarge2
kernel-image-2.6.8-3-s390-tape — 2.6.8-5sarge2
kernel-image-2.6.8-3-s390x — 2.6.8-5sarge2
m68k:
kernel-image-2.6.8-amiga — 2.6.8-4sarge2
kernel-image-2.6.8-atari — 2.6.8-4sarge2
kernel-image-2.6.8-bvme6000 — 2.6.8-4sarge2
kernel-image-2.6.8-hp — 2.6.8-4sarge2
kernel-image-2.6.8-mac — 2.6.8-4sarge2
kernel-image-2.6.8-mvme147 — 2.6.8-4sarge2
kernel-image-2.6.8-mvme16x — 2.6.8-4sarge2
kernel-image-2.6.8-q40 — 2.6.8-4sarge2
kernel-image-2.6.8-sun3 — 2.6.8-4sarge2
i686:
kernel-headers-2.6-amd64-generic — 103sarge1
kernel-headers-2.6-amd64-k8 — 103sarge1
kernel-headers-2.6-amd64-k8-smp — 103sarge1
kernel-headers-2.6-em64t-p4 — 103sarge1
kernel-headers-2.6-em64t-p4-smp — 103sarge1
kernel-image-2.6-amd64-generic — 103sarge1
kernel-image-2.6-amd64-k8 — 103sarge1
kernel-image-2.6-amd64-k8-smp — 103sarge1
kernel-image-2.6-em64t-p4 — 103sarge1
kernel-image-2.6-em64t-p4-smp — 103sarge1
kernel-headers-2.6-386 — 101sarge1
kernel-headers-2.6-686 — 101sarge1
kernel-headers-2.6-686-smp — 101sarge1
kernel-headers-2.6-k7 — 101sarge1
kernel-headers-2.6-k7-smp — 101sarge1
kernel-image-2.6-386 — 101sarge1
kernel-image-2.6-686 — 101sarge1
kernel-image-2.6-686-smp — 101sarge1
kernel-image-2.6-k7 — 101sarge1
kernel-image-2.6-k7-smp — 101sarge1
fai-kernels — 1.9.1sarge1
kernel-headers-2.6.8-2 — 2.6.8-16sarge1
kernel-headers-2.6.8-2-386 — 2.6.8-16sarge1
kernel-headers-2.6.8-2-686 — 2.6.8-16sarge1
kernel-headers-2.6.8-2-686-smp — 2.6.8-16sarge1
kernel-headers-2.6.8-2-k7 — 2.6.8-16sarge1
kernel-headers-2.6.8-2-k7-smp — 2.6.8-16sarge1
kernel-headers-2.6.8-3 — 2.6.8-16sarge2
kernel-headers-2.6.8-3-386 — 2.6.8-16sarge2
kernel-headers-2.6.8-3-686 — 2.6.8-16sarge2
kernel-headers-2.6.8-3-686-smp — 2.6.8-16sarge2
kernel-headers-2.6.8-3-k7 — 2.6.8-16sarge2
kernel-headers-2.6.8-3-k7-smp — 2.6.8-16sarge2
kernel-image-2.6.8-2-386 — 2.6.8-16sarge1
kernel-image-2.6.8-2-686 — 2.6.8-16sarge1
kernel-image-2.6.8-2-686-smp — 2.6.8-16sarge1
kernel-image-2.6.8-2-k7 — 2.6.8-16sarge1
kernel-image-2.6.8-2-k7-smp — 2.6.8-16sarge1
kernel-image-2.6.8-3-386 — 2.6.8-16sarge2
kernel-image-2.6.8-3-686 — 2.6.8-16sarge2
kernel-image-2.6.8-3-686-smp — 2.6.8-16sarge2
kernel-image-2.6.8-3-k7 — 2.6.8-16sarge2
kernel-image-2.6.8-3-k7-smp — 2.6.8-16sarge2
kernel-headers-2.6.8-11 — 2.6.8-16sarge1
kernel-headers-2.6.8-11-amd64-generic — 2.6.8-16sarge1
kernel-headers-2.6.8-11-amd64-k8 — 2.6.8-16sarge1
kernel-headers-2.6.8-11-amd64-k8-smp — 2.6.8-16sarge1
kernel-headers-2.6.8-11-em64t-p4 — 2.6.8-16sarge1
kernel-headers-2.6.8-11-em64t-p4-smp — 2.6.8-16sarge1
kernel-headers-2.6.8-12 — 2.6.8-16sarge2
kernel-headers-2.6.8-12-amd64-generic — 2.6.8-16sarge2
kernel-headers-2.6.8-12-amd64-k8 — 2.6.8-16sarge2
kernel-headers-2.6.8-12-amd64-k8-smp — 2.6.8-16sarge2
kernel-headers-2.6.8-12-em64t-p4 — 2.6.8-16sarge2
kernel-headers-2.6.8-12-em64t-p4-smp — 2.6.8-16sarge2
kernel-image-2.6.8-11-amd64-generic — 2.6.8-16sarge1
kernel-image-2.6.8-11-amd64-k8 — 2.6.8-16sarge1
kernel-image-2.6.8-11-amd64-k8-smp — 2.6.8-16sarge1
kernel-image-2.6.8-11-em64t-p4 — 2.6.8-16sarge1
kernel-image-2.6.8-11-em64t-p4-smp — 2.6.8-16sarge1
kernel-image-2.6.8-12-amd64-generic — 2.6.8-16sarge2
kernel-image-2.6.8-12-amd64-k8 — 2.6.8-16sarge2
kernel-image-2.6.8-12-amd64-k8-smp — 2.6.8-16sarge2
kernel-image-2.6.8-12-em64t-p4 — 2.6.8-16sarge2
kernel-image-2.6.8-12-em64t-p4-smp — 2.6.8-16sarge2
hostap-modules-2.4.27-3-386 — 0.3.7-1sarge1
hostap-modules-2.4.27-3-586tsc — 0.3.7-1sarge1
hostap-modules-2.4.27-3-686 — 0.3.7-1sarge1
hostap-modules-2.4.27-3-686-smp — 0.3.7-1sarge1
hostap-modules-2.4.27-3-k6 — 0.3.7-1sarge1
hostap-modules-2.4.27-3-k7 — 0.3.7-1sarge1
hostap-modules-2.4.27-3-k7-smp — 0.3.7-1sarge1
hostap-modules-2.6.8-3-386 — 0.3.7-1sarge1
hostap-modules-2.6.8-3-686 — 0.3.7-1sarge1
hostap-modules-2.6.8-3-686-smp — 0.3.7-1sarge1
hostap-modules-2.6.8-3-k7 — 0.3.7-1sarge1
hostap-modules-2.6.8-3-k7-smp — 0.3.7-1sarge1
ndiswrapper-modules-2.6.8-3-386 — 1.1-2sarge1
ndiswrapper-modules-2.6.8-3-686 — 1.1-2sarge1
ndiswrapper-modules-2.6.8-3-686-smp — 1.1-2sarge1
ndiswrapper-modules-2.6.8-3-k7 — 1.1-2sarge1
ndiswrapper-modules-2.6.8-3-k7-smp — 1.1-2sarge1
sparc:
kernel-headers-2.6-sparc32 — 101sarge1
kernel-headers-2.6-sparc64 — 101sarge1
kernel-headers-2.6-sparc64-smp — 101sarge1
kernel-image-2.6-sparc32 — 101sarge1
kernel-image-2.6-sparc64 — 101sarge1
kernel-image-2.6-sparc64-smp — 101sarge1
kernel-build-2.6.8-2 — 2.6.8-15sarge1
kernel-build-2.6.8-3 — 2.6.8-15sarge2
kernel-headers-2.6.8-2 — 2.6.8-15sarge1
kernel-headers-2.6.8-2-sparc32 — 2.6.8-15sarge1
kernel-headers-2.6.8-2-sparc64 — 2.6.8-15sarge1
kernel-headers-2.6.8-2-sparc64-smp — 2.6.8-15sarge1
kernel-headers-2.6.8-3 — 2.6.8-15sarge2
kernel-headers-2.6.8-3-sparc32 — 2.6.8-15sarge2
kernel-headers-2.6.8-3-sparc64 — 2.6.8-15sarge2
kernel-headers-2.6.8-3-sparc64-smp — 2.6.8-15sarge2
kernel-image-2.6.8-2-sparc32 — 2.6.8-15sarge1
kernel-image-2.6.8-2-sparc64 — 2.6.8-15sarge1
kernel-image-2.6.8-2-sparc64-smp — 2.6.8-15sarge1
kernel-image-2.6.8-3-sparc32 — 2.6.8-15sarge2
kernel-image-2.6.8-3-sparc64 — 2.6.8-15sarge2
kernel-image-2.6.8-3-sparc64-smp — 2.6.8-15sarge2
x86-64:
kernel-headers-2.6-amd64-generic — 103sarge1
kernel-headers-2.6-amd64-k8 — 103sarge1
kernel-headers-2.6-amd64-k8-smp — 103sarge1
kernel-headers-2.6-em64t-p4 — 103sarge1
kernel-headers-2.6-em64t-p4-smp — 103sarge1
kernel-image-2.6-amd64-generic — 103sarge1
kernel-image-2.6-amd64-k8 — 103sarge1
kernel-image-2.6-amd64-k8-smp — 103sarge1
kernel-image-2.6-em64t-p4 — 103sarge1
kernel-image-2.6-em64t-p4-smp — 103sarge1
kernel-headers-2.6.8-11 — 2.6.8-16sarge1
kernel-headers-2.6.8-11-amd64-generic — 2.6.8-16sarge1
kernel-headers-2.6.8-11-amd64-k8 — 2.6.8-16sarge1
kernel-headers-2.6.8-11-amd64-k8-smp — 2.6.8-16sarge1
kernel-headers-2.6.8-11-em64t-p4 — 2.6.8-16sarge1
kernel-headers-2.6.8-11-em64t-p4-smp — 2.6.8-16sarge1
kernel-headers-2.6.8-12 — 2.6.8-16sarge2
kernel-headers-2.6.8-12-amd64-generic — 2.6.8-16sarge2
kernel-headers-2.6.8-12-amd64-k8 — 2.6.8-16sarge2
kernel-headers-2.6.8-12-amd64-k8-smp — 2.6.8-16sarge2
kernel-headers-2.6.8-12-em64t-p4 — 2.6.8-16sarge2
kernel-headers-2.6.8-12-em64t-p4-smp — 2.6.8-16sarge2
kernel-image-2.6.8-11-amd64-generic — 2.6.8-16sarge1
kernel-image-2.6.8-11-amd64-k8 — 2.6.8-16sarge1
kernel-image-2.6.8-11-amd64-k8-smp — 2.6.8-16sarge1
kernel-image-2.6.8-11-em64t-p4 — 2.6.8-16sarge1
kernel-image-2.6.8-11-em64t-p4-smp — 2.6.8-16sarge1
kernel-image-2.6.8-12-amd64-generic — 2.6.8-16sarge2
kernel-image-2.6.8-12-amd64-k8 — 2.6.8-16sarge2
kernel-image-2.6.8-12-amd64-k8-smp — 2.6.8-16sarge2
kernel-image-2.6.8-12-em64t-p4 — 2.6.8-16sarge2
kernel-image-2.6.8-12-em64t-p4-smp — 2.6.8-16sarge2
ia64:
kernel-headers-2.6-itanium — 2.6.8-14sarge2
kernel-headers-2.6-itanium-smp — 2.6.8-14sarge2
kernel-headers-2.6-mckinley — 2.6.8-14sarge2
kernel-headers-2.6-mckinley-smp — 2.6.8-14sarge2
kernel-headers-2.6.8-2 — 2.6.8-14sarge1
kernel-headers-2.6.8-2-itanium — 2.6.8-14sarge1
kernel-headers-2.6.8-2-itanium-smp — 2.6.8-14sarge1
kernel-headers-2.6.8-2-mckinley — 2.6.8-14sarge1
kernel-headers-2.6.8-2-mckinley-smp — 2.6.8-14sarge1
kernel-headers-2.6.8-3 — 2.6.8-14sarge2
kernel-headers-2.6.8-3-itanium — 2.6.8-14sarge2
kernel-headers-2.6.8-3-itanium-smp — 2.6.8-14sarge2
kernel-headers-2.6.8-3-mckinley — 2.6.8-14sarge2
kernel-headers-2.6.8-3-mckinley-smp — 2.6.8-14sarge2
kernel-image-2.6-itanium — 2.6.8-14sarge2
kernel-image-2.6-itanium-smp — 2.6.8-14sarge2
kernel-image-2.6-mckinley — 2.6.8-14sarge2
kernel-image-2.6-mckinley-smp — 2.6.8-14sarge2
kernel-image-2.6.8-2-itanium — 2.6.8-14sarge1
kernel-image-2.6.8-2-itanium-smp — 2.6.8-14sarge1
kernel-image-2.6.8-2-mckinley — 2.6.8-14sarge1
kernel-image-2.6.8-2-mckinley-smp — 2.6.8-14sarge1
kernel-image-2.6.8-3-itanium — 2.6.8-14sarge2
kernel-image-2.6.8-3-itanium-smp — 2.6.8-14sarge2
kernel-image-2.6.8-3-mckinley — 2.6.8-14sarge2
kernel-image-2.6.8-3-mckinley-smp — 2.6.8-14sarge2
alpha:
kernel-headers-2.6-generic — 101sarge1
kernel-headers-2.6-smp — 101sarge1
kernel-image-2.6-generic — 101sarge1
kernel-image-2.6-smp — 101sarge1
kernel-headers-2.6.8-2 — 2.6.8-16sarge1
kernel-headers-2.6.8-2-generic — 2.6.8-16sarge1
kernel-headers-2.6.8-2-smp — 2.6.8-16sarge1
kernel-headers-2.6.8-3 — 2.6.8-16sarge2
kernel-headers-2.6.8-3-generic — 2.6.8-16sarge2
kernel-headers-2.6.8-3-smp — 2.6.8-16sarge2
kernel-image-2.6.8-2-generic — 2.6.8-16sarge1
kernel-image-2.6.8-2-smp — 2.6.8-16sarge1
kernel-image-2.6.8-3-generic — 2.6.8-16sarge2
kernel-image-2.6.8-3-smp — 2.6.8-16sarge2
noarch:
kernel-doc-2.6.8 — 2.6.8-16sarge2
kernel-patch-debian-2.6.8 — 2.6.8-16sarge2
kernel-source-2.6.8 — 2.6.8-16sarge2
kernel-tree-2.6.8 — 2.6.8-16sarg
.
Статус уязвимости: Подтверждена производителем
Наличие эксплойта: Данные уточняются
Информация об устранении: Уязвимость устранена
Идентификаторы других систем описаний уязвимости: CVE-2006-1066. CVE-2005-0124. CVE-2005-0449. CVE-2005-2457. CVE-2005-2490. CVE-2005-2555. CVE-2005-2709. CVE-2005-2800. CVE-2005-2973. CVE-2005-3044. CVE-2005-3053. CVE-2005-3055. CVE-2005-3180. CVE-2005-3181. CVE-2005-3257. CVE-2005-3356. CVE-2005-3358. CVE-2005-3783. CVE-2005-3784. CVE-2005-3806. CVE-2005-3847. CVE-2005-3848. CVE-2005-3857. CVE-2006-0482. CVE-2004-1017. CVE-2005-3858. CVE-2005-4605. CVE-2005-4618. CVE-2006-0095. CVE-2006-0096. DSA-1017. ID:1400634.

Тип ошибки CWE:
Ссылки на источники:
cайт ФАУ «ГНИИИ ПТЗИ ФСТЭК России».
http://www.debian.org/security/dsa-1017/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2709
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0095
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1066
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0124
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0449
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3858
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3180
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2555
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2457
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0482
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3848
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3847
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3257
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3356
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3857
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4605
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4618
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3806
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3181
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3358
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3055
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2973
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2490
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2800
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3044
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1017
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3053

ФСТЭК России

Об авторе ФСТЭК России

Аккаунт для добавления уязвимостей с банка данных угроз безопасности информации ФСТЭК России. Не является оф. аккаунтом ФСТЭК России.
Читать все записи автора ФСТЭК России

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *