Oracle Linux 5 : ELSA-2014-0433-1: / kernel (ELSA-2014-04331) (deprecated)

high Nessus Plugin ID 181023

Synopsis

This plugin has been deprecated.

Description

The remote Oracle Linux 5 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2014-04331 advisory.

- Multiple array index errors in drivers/hid/hid-core.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11 allow physically proximate attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted device that provides an invalid Report ID.
(CVE-2013-2888)

- The tcp_rcv_state_process function in net/ipv4/tcp_input.c in the Linux kernel before 3.2.24 allows remote attackers to cause a denial of service (kernel resource consumption) via a flood of SYN+FIN TCP packets, a different vulnerability than CVE-2012-2663. (CVE-2012-6638)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

This plugin has been deprecated as it is a duplicate of oraclelinux_ELSA-2014-0433-1.nasl (plugin ID 73720).

See Also

https://linux.oracle.com/errata/ELSA-2014-0433-1.html

Plugin Details

Severity: High

ID: 181023

File Name: oraclelinux_ELSA-2014-04331.nasl

Version: 1.1

Type: local

Agent: unix

Published: 9/7/2023

Updated: 10/6/2023

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.2

Temporal Score: 4.6

Vector: CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2013-2888

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2012-6638

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:ocfs2-2.6.18-371.8.1.0.1.el5pae, p-cpe:/a:oracle:linux:oracleasm-2.6.18-371.8.1.0.1.el5xen, cpe:/o:oracle:linux:5, p-cpe:/a:oracle:linux:kernel-xen, p-cpe:/a:oracle:linux:kernel-devel, p-cpe:/a:oracle:linux:oracleasm-2.6.18-371.8.1.0.1.el5debug, p-cpe:/a:oracle:linux:kernel-pae-devel, p-cpe:/a:oracle:linux:ocfs2-2.6.18-371.8.1.0.1.el5debug, p-cpe:/a:oracle:linux:oracleasm-2.6.18-371.8.1.0.1.el5pae, p-cpe:/a:oracle:linux:oracleasm-2.6.18-371.8.1.0.1.el5, p-cpe:/a:oracle:linux:kernel-xen-devel, p-cpe:/a:oracle:linux:ocfs2-2.6.18-371.8.1.0.1.el5, p-cpe:/a:oracle:linux:kernel-pae, p-cpe:/a:oracle:linux:kernel-debug-devel, p-cpe:/a:oracle:linux:ocfs2-2.6.18-371.8.1.0.1.el5xen, p-cpe:/a:oracle:linux:kernel-debug, p-cpe:/a:oracle:linux:kernel-headers, p-cpe:/a:oracle:linux:kernel

Required KB Items: Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list, Host/local_checks_enabled

Exploit Ease: No known exploits are available

Patch Publication Date: 4/25/2014

Vulnerability Publication Date: 8/28/2013

Reference Information

CVE: CVE-2012-6638, CVE-2013-2888