This script is Copyright (C) 2006-2016 Tenable Network Security, Inc.
The remote Mandrake Linux host is missing one or more security
Multiple vulnerabilities in the Linux 2.6 kernel have been discovered
and corrected in this update :
An integer overflow in vc_resize (CVE-2004-1333).
A race condition in the sysfs_read_file and sysfs_write_file functions
in 2.6.10 and earlier allows local users to read kernel memory and
cause a DoS (crash) via large offsets in sysfs files (CVE-2004-2302).
An integer signedness error in scsi_ioctl.c (CVE-2005-0180).
Netfilter allows a local user to cause a DoS (memory consumption) via
certain packet fragments that are reassembled twice, which causes a
data structure to be allocated twice (CVE-2005-0210).
A DoS in pkt_ioctl in pktcdvc.c (CVE-2005-1589).
An array index overflow in the xfrm_sk_policy_insert function in
xfrm_user.c allows local users to cause a DoS (oops or deadlock) and
possibly execute arbitrary code (CVE-2005-2456).
The zisofs driver in versions prior to 184.108.40.206 allows local users and
remove attackers to cause a DoS (crash) via a crafted compressed ISO
inflate.c in the zlib routines in versions prior to 220.127.116.11 allow
remove attackers to cause a DoS (crash) via a compressed file with
'improper tables' (CVE-2005-2458).
The huft_build function in inflate.c in the zlib routines in versions
prior to 18.104.22.168 returns the wrong value, allowing remote attackers
to cause a DoS (crash) via a certain compressed file that leads to a
NULL pointer dereference (CVE-2005-2459).
A stack-based buffer overflow in the sendmsg function call in versions
prior to 22.214.171.124 allow local users to execute arbitrary code by
calling sendmsg and modifying the message contents in another thread
vlan_dev.c in version 2.6.8 allows remote attackers to cause a DoS
(oops from null dereference) via certain UDP packets that lead to a
function call with the wrong argument (CVE-2005-2548).
The kernel does not properly restrict socket policy access to users
with the CAP_NET_ADMIN capability, which could allow local users to
conduct unauthorized activities via ipv4/ip_sockglue.c and
A memory leak in the seq_file implementation in the SCSI procfs
interface (sg.c) in 2.6.13 and earlier allows a local user to cause a
DoS (memory consumption) via certain repeated reads from
/proc/scsi/gs/devices file which is not properly handled when the
next() interator returns NULL or an error (CVE-2005-2800).
xattr.c in the ext2 and ext3 file system code does not properly
compare the name_index fields when sharing xattr blocks which could
prevent ACLs from being applied (CVE-2005-2801).
The ipt_recent module in versions prior to 2.6.12 when running on
64bit processors allows remote attackers to cause a DoS (kernel panic)
via certain attacks such as SSH brute force (CVE-2005-2872).
The ipt_recent module in versions prior to 2.6.12 does not properly
perform certain tests when the jiffies value is greater than LONG_MAX,
which can cause ipt_recent netfilter rules to block too early
Multiple vulnerabilities in versions prior to 126.96.36.199 allow local
users to cause a DoS (oops from null dereference) via fput in a 32bit
ioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl
function on 64-bit systems (CVE-2005-3044).
The sys_set_mempolicy function in mempolicy.c allows local users to
cause a DoS via a negative first argument (CVE-2005-3053).
Versions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops)
via a userspace process that issues a USB Request Block (URB) to a USB
device and terminates before the URB is finished, which leads to a
stale pointer reference (CVE-2005-3055).
The Orinoco driver in 2.6.13 and earlier does not properly clear
memory from a previously used packet whose length is increased,
allowing remote attackers to obtain sensitive information
Kernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use
an incorrect function to free names_cache memory, preventing the
memory from being tracked by AUDITSYSCALL code and leading to a memory
The VT implementation in version 2.6.12 allows local users to use
certain IOCTLs on terminals of other users and gain privileges
Exec does not properly clear posix-timers in multi-threaded
environments, which result in a resource leak and could allow a large
number of multiple local users to cause a DoS by using more posix-
timers than specified by the quota for a single user (CVE-2005-3271).
The rose_rt_ioctl function rose_route.c in versions prior to 2.6.12
does not properly verify the ndigis argument for a new route, allowing
an attacker to trigger array out-of-bounds errors with a large number
of digipeats (CVE-2005-3273).
A race condition in ip_vs_conn_flush in versions prior to 2.6.13, when
running on SMP systems, allows local users to cause a DoS (null
dereference) by causing a connection timer to expire while the
connection table is being flushed before the appropriate lock is
The NAT code in versions prior to 2.6.13 incorrectly declares a
variable to be static, allowing remote attackers to cause a DoS
(memory corruption) by causing two packets for the same protocol to be
NATed at the same time (CVE-2005-3275).
The sys_get_thread_area function in process.c in versions prior to
188.8.131.52 and 2.6.13 does not clear a data structure before copying it
to userspace, which may allow a user process to obtain sensitive
The following non-security fixes are also applied :
Driver updates were made to the aic97xx and sata_sil modules.
Support was added for ATI ipx400 chipsets, for IDE and sound.
A build problem with icecream on the x86_64 platform was fixed.
The pin1 APIC timer on RS480-based motherboards was disabled.
The provided packages are patched to fix these vulnerabilities. All
users are encouraged to upgrade to these updated kernels.
To update your kernel, please follow the directions located at :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.2
CVSS Temporal Score : 5.6
Public Exploit Available : true
Family: Mandriva Local Security Checks
Nessus Plugin ID: 20450 (mandrake_MDKSA-2005-219.nasl)
Bugtraq ID: 14902
CVE ID: CVE-2004-1333
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now