How to Buy
This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.
The remote Slackware host is missing a security update.
New kernels are available for Slackware 9.1 and -current to fix a
bounds-checking problem in the kernel's mremap() call which could be
used by a local attacker to gain root privileges. Please note that
this is not the same issue as CAN-2003-0985 which was fixed in early
January. The kernels in Slackware 8.1 and 9.0 that were updated in
January are not vulnerable to this new issue because the patch from
Solar Designer that was used to fix the CAN-2003-0985 bugs also
happened to fix the problem that was discovered later. Sites running
Slackware 9.1 or -current should upgrade to a new kernel. After
installing the new kernel, be sure to run 'lilo'.
See also :
Update the affected kernel-ide and / or kernel-source packages.
Risk factor :
High / CVSS Base Score : 7.2
Public Exploit Available : true
Family: Slackware Local Security Checks
Nessus Plugin ID: 18789 ()
CVE ID: CVE-2004-0077
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.