Oracle Linux 5 : ELSA-2013-0168-1: / kernel (ELSA-2013-01681) (deprecated)

high Nessus Plugin ID 181050

Synopsis

This plugin has been deprecated.

Description

The remote Oracle Linux 5 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2013-01681 advisory.

- The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries. (CVE-2012-1568)

- The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments. (CVE-2012-4444)

- The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value. (CVE-2012-5515)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

This plugin has been deprecated as it is a duplicate of oraclelinux_ELSA-2013-0168-1.nasl (plugin ID 68710).

See Also

https://linux.oracle.com/errata/ELSA-2013-0168-1.html

Plugin Details

Severity: High

ID: 181050

File Name: oraclelinux_ELSA-2013-01681.nasl

Version: 1.2

Type: local

Agent: unix

Published: 9/7/2023

Updated: 10/6/2023

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.0

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2012-4444

CVSS v3

Risk Factor: High

Base Score: 8.4

Temporal Score: 7.3

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2012-1568

Vulnerability Information

CPE: cpe:/o:oracle:linux:5, p-cpe:/a:oracle:linux:kernel-xen, p-cpe:/a:oracle:linux:ocfs2-2.6.18-348.1.1.0.1.el5, p-cpe:/a:oracle:linux:kernel-devel, p-cpe:/a:oracle:linux:kernel-pae-devel, p-cpe:/a:oracle:linux:ocfs2-2.6.18-348.1.1.0.1.el5debug, p-cpe:/a:oracle:linux:oracleasm-2.6.18-348.1.1.0.1.el5pae, p-cpe:/a:oracle:linux:kernel-xen-devel, p-cpe:/a:oracle:linux:kernel-pae, p-cpe:/a:oracle:linux:ocfs2-2.6.18-348.1.1.0.1.el5pae, p-cpe:/a:oracle:linux:oracleasm-2.6.18-348.1.1.0.1.el5, p-cpe:/a:oracle:linux:kernel-debug-devel, p-cpe:/a:oracle:linux:oracleasm-2.6.18-348.1.1.0.1.el5xen, p-cpe:/a:oracle:linux:kernel-debug, p-cpe:/a:oracle:linux:kernel-headers, p-cpe:/a:oracle:linux:kernel, p-cpe:/a:oracle:linux:oracleasm-2.6.18-348.1.1.0.1.el5debug, p-cpe:/a:oracle:linux:ocfs2-2.6.18-348.1.1.0.1.el5xen

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/OracleLinux

Exploit Ease: No known exploits are available

Patch Publication Date: 1/22/2013

Vulnerability Publication Date: 3/22/2012

Reference Information

CVE: CVE-2012-1568, CVE-2012-4444, CVE-2012-5515