This script is Copyright (C) 2004-2013 Tenable Network Security, Inc.
The remote Mandrake Linux host is missing one or more security
A number of vulnerabilities were discovered in the Linux kernel that
are corrected with this update :
Multiple vulnerabilities were found by the Sparse source checker that
could allow local users to elevate privileges or gain access to kernel
Missing Discretionary Access Controls (DAC) checks in the chown(2)
system call could allow an attacker with a local account to change the
group ownership of arbitrary files, which could lead to root
privileges on affected systems (CVE-2004-0497).
An information leak vulnerability that affects only ia64 systems was
Insecure permissions on /proc/scsi/qla2300/HbaApiNode could allow a
local user to cause a DoS on the system; this only affects
Mandrakelinux 9.2 and below (CVE-2004-0587).
A vulnerability that could crash the kernel has also been fixed. This
crash, however, can only be exploited via root (in br_if.c).
The provided packages are patched to fix these vulnerabilities. All
users are encouraged to upgrade to these updated kernels.
To update your kernel, please follow the directions located at :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.2
Family: Mandriva Local Security Checks
Nessus Plugin ID: 14165 (mandrake_MDKSA-2004-066.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now