Ubuntu 4.10 : linux-source-2.6.8.1 vulnerabilities (USN-30-1)

critical Nessus Plugin ID 20646
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

CAN-2004-0883, CAN-2004-0949 :

During an audit of the smb file system implementation within Linux, several vulnerabilities were discovered ranging from out of bounds read accesses to kernel level buffer overflows.

To exploit any of these vulnerabilities, an attacker needs control over the answers of the connected Samba server. This could be achieved by man-in-the-middle attacks or by taking over the Samba server with e. g. the recently disclosed vulnerability in Samba 3.x (see CAN-2004-0882).

While any of these vulnerabilities can be easily used as remote denial of service exploits against Linux systems, it is unclear if it is possible for a skilled local or remote attacker to use any of the possible buffer overflows for arbitrary code execution in kernel space. So these bugs may theoretically lead to privilege escalation and total compromise of the whole system.

http://isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt :

Several flaws have been found in the Linux ELF binary loader's handling of setuid binaries. Nowadays ELF is the standard format for Linux executables and libraries. setuid binaries are programs that have the 'setuid' file permission bit set; they allow to execute a program under a user id different from the calling user and are mostly used to allow executing a program with root privileges to normal users.

The vulnerabilities that were fixed in these updated kernel packages could lead Denial of Service attacks. They also might lead to execution of arbitrary code and privilege escalation on some platforms if an attacker is able to run setuid programs under some special system conditions (like very little remaining memory).

Another flaw could allow an attacker to read supposedly unreadable, but executable suid binaries. The attacker can then use this to seek faults within the executable.

http://marc.theaimsgroup.com/?l=linux-kernel&m=109776571411003&w=2 :

Bernard Gagnon discovered a memory leak in the mmap raw packet socket implementation. When a client application (in ELF format) core dumps, a region of memory stays allocated as a ring buffer. This could be exploited by a malicious user who repeatedly crashes certain types of applications until the memory is exhausted, thus causing a Denial of Service.

Reverted 486 emulation patch :

Ubuntu kernels for the i386 platforms are compiled using the i486 instruction set for performance reasons. Former Ubuntu kernels contained code which emulated the missing instructions on real 386 processors. However, several actual and potential security flaws have been discovered in the code, and it was found to be unsupportable. It might be possible to exploit these vulnerabilities also on i486 and higher processors.

Therefore support for real i386 processors has ceased. This updated kernel will only run on i486 and newer processors.

Other architectures supported by Ubuntu (amd64, powerpc) are not affected.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected packages.

Plugin Details

Severity: Critical

ID: 20646

File Name: ubuntu_USN-30-1.nasl

Version: 1.14

Type: local

Agent: unix

Published: 1/15/2006

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.8.1, p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-3, p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-3-386, p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-3-686, p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-3-686-smp, p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-3-amd64-generic, p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-3-amd64-k8, p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-3-amd64-k8-smp, p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-3-amd64-xeon, p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-3-386, p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-3-686, p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-3-686-smp, p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-3-amd64-generic, p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-3-amd64-k8, p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-3-amd64-k8-smp, p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-3-amd64-xeon, p-cpe:/a:canonical:ubuntu_linux:linux-patch-debian-2.6.8.1, p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.8.1, p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.8.1, cpe:/o:canonical:ubuntu_linux:4.10

Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l

Patch Publication Date: 11/19/2004

Reference Information

CVE: CVE-2004-0882, CVE-2004-0883, CVE-2004-0949

USN: 30-1