Oracle Linux 5 : ELSA-2017-0323-1: / kernel (ELSA-2017-03231) (deprecated)

high Nessus Plugin ID 181098

Synopsis

This plugin has been deprecated.

Description

The remote Oracle Linux 5 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2017-03231 advisory.

- The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call. (CVE-2017-6074)

- It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system.
(CVE-2017-2634)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

This plugin has been deprecated as it is a duplicate of oraclelinux_ELSA-2017-0323-1.nasl (plugin ID 97404).

See Also

https://linux.oracle.com/errata/ELSA-2017-0323-1.html

Plugin Details

Severity: High

ID: 181098

File Name: oraclelinux_ELSA-2017-03231.nasl

Version: 1.2

Type: local

Agent: unix

Published: 9/7/2023

Updated: 10/6/2023

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.0

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2017-6074

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:oracle:linux:5, p-cpe:/a:oracle:linux:kernel-xen, p-cpe:/a:oracle:linux:ocfs2-2.6.18-419.0.0.0.1.el5debug, p-cpe:/a:oracle:linux:ocfs2-2.6.18-419.0.0.0.1.el5xen, p-cpe:/a:oracle:linux:kernel-devel, p-cpe:/a:oracle:linux:oracleasm-2.6.18-419.0.0.0.1.el5xen, p-cpe:/a:oracle:linux:kernel-pae-devel, p-cpe:/a:oracle:linux:oracleasm-2.6.18-419.0.0.0.1.el5, p-cpe:/a:oracle:linux:kernel-xen-devel, p-cpe:/a:oracle:linux:oracleasm-2.6.18-419.0.0.0.1.el5pae, p-cpe:/a:oracle:linux:kernel-pae, p-cpe:/a:oracle:linux:oracleasm-2.6.18-419.0.0.0.1.el5debug, p-cpe:/a:oracle:linux:kernel-debug-devel, p-cpe:/a:oracle:linux:kernel-debug, p-cpe:/a:oracle:linux:kernel-headers, p-cpe:/a:oracle:linux:kernel, p-cpe:/a:oracle:linux:ocfs2-2.6.18-419.0.0.0.1.el5pae, p-cpe:/a:oracle:linux:ocfs2-2.6.18-419.0.0.0.1.el5

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/OracleLinux

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/25/2017

Vulnerability Publication Date: 2/18/2017

Exploitable With

Core Impact

Reference Information

CVE: CVE-2017-2634, CVE-2017-6074