The isdn_ioctl function in isdn_common.c in Linux kernel 2.6.23 allows local users to cause a denial of service via a crafted ioctl struct in which iocts is not null terminated, which triggers a buffer overflow.
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html
http://lists.vmware.com/pipermail/security-announce/2008/000023.html
http://rhn.redhat.com/errata/RHSA-2008-0055.html
http://secunia.com/advisories/28626
http://secunia.com/advisories/28706
http://secunia.com/advisories/28748
http://secunia.com/advisories/28889
http://secunia.com/advisories/28971
http://secunia.com/advisories/29058
http://secunia.com/advisories/29570
http://secunia.com/advisories/30110
http://secunia.com/advisories/30962
http://secunia.com/advisories/31246
http://secunia.com/advisories/33280
http://www.debian.org/security/2008/dsa-1479
http://www.debian.org/security/2008/dsa-1503
http://www.debian.org/security/2008/dsa-1504
http://www.mandriva.com/security/advisories?name=MDVSA-2008:086
http://www.mandriva.com/security/advisories?name=MDVSA-2008:112
http://www.redhat.com/support/errata/RHSA-2008-0211.html
http://www.redhat.com/support/errata/RHSA-2008-0787.html
http://www.securityfocus.com/bid/27497
http://www.ubuntu.com/usn/usn-574-1
http://www.ubuntu.com/usn/usn-578-1
http://www.vupen.com/english/advisories/2008/2222/references
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10971
OR
ID | Name | Product | Family | Severity |
---|---|---|---|---|
67678 | Oracle Linux 3 : kernel (ELSA-2008-0211) | Nessus | Oracle Linux Local Security Checks | high |
67641 | Oracle Linux 4 : kernel (ELSA-2008-0055) | Nessus | Oracle Linux Local Security Checks | high |
60393 | Scientific Linux Security Update : kernel on SL3.x i386/x86_64 | Nessus | Scientific Linux Local Security Checks | high |
60354 | Scientific Linux Security Update : kernel on SL4.x i386/x86_64 | Nessus | Scientific Linux Local Security Checks | high |
59128 | SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 5370) | Nessus | SuSE Local Security Checks | high |
40380 | VMSA-2008-0011 : Updated ESX service console packages for Samba and vmnix | Nessus | VMware ESX Local Security Checks | high |
36852 | Mandriva Linux Security Advisory : kernel (MDVSA-2008:112) | Nessus | Mandriva Local Security Checks | high |
35323 | RHEL 2.1 : kernel (RHSA-2009:0001) | Nessus | Red Hat Local Security Checks | high |
33432 | SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 5375) | Nessus | SuSE Local Security Checks | high |
32160 | RHEL 3 : kernel (RHSA-2008:0211) | Nessus | Red Hat Local Security Checks | high |
32139 | CentOS 3 : kernel (CESA-2008:0211) | Nessus | CentOS Local Security Checks | high |
31148 | Debian DSA-1504-1 : kernel-source-2.6.8 - several vulnerabilities | Nessus | Debian Local Security Checks | high |
31147 | Debian DSA-1503-1 : kernel-source-2.4.27 - several vulnerabilities | Nessus | Debian Local Security Checks | high |
31093 | Ubuntu 6.06 LTS : linux-source-2.6.15 vulnerabilities (USN-578-1) | Nessus | Ubuntu Local Security Checks | high |
31090 | openSUSE 10 Security Update : kernel (kernel-4987) | Nessus | SuSE Local Security Checks | high |
30183 | Ubuntu 6.10 / 7.04 / 7.10 : linux-source-2.6.17/20/22 vulnerabilities (USN-574-1) | Nessus | Ubuntu Local Security Checks | high |
30154 | CentOS 4 : kernel (CESA-2008:0055) | Nessus | CentOS Local Security Checks | high |
30140 | RHEL 4 : kernel (RHSA-2008:0055) | Nessus | Red Hat Local Security Checks | high |
30126 | Debian DSA-1479-1 : linux-2.6 - several vulnerabilities | Nessus | Debian Local Security Checks | high |
801444 | CentOS RHSA-2008-0055 Security Check | Log Correlation Engine | Generic | high |