RHEL 5 : kernel (Unpatched Vulnerability)

critical Nessus Plugin ID 199257

Synopsis

The remote Red Hat 5 host is affected by multiple vulnerabilities that will not be patched.

Description

The remote Redhat Enterprise Linux 5 host has one or more packages installed that are affected by multiple vulnerabilities that have been acknowledged by the vendor but will not be patched.

- kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017)

- The ia64 subsystem in the Linux kernel before 2.6.26 allows local users to cause a denial of service (stack consumption and system crash) via a crafted application that leverages the mishandling of invalid Register Stack Engine (RSE) state. (CVE-2006-3635)

- drivers/media/video/videobuf-vmalloc.c in the Linux kernel before 2.6.24 does not initialize videobuf_mapping data structures, which allows local users to trigger an incorrect count value and videobuf leak via unspecified vectors, a different vulnerability than CVE-2010-5321. (CVE-2007-6761)

Note that Nessus has not tested for these issues but has instead relied on the package manager's report that the package is installed.

Solution

The vendor has acknowledged the vulnerabilities but no solution has been provided. Refer to the vendor for remediation guidance.

See Also

http://www.nessus.org/u?0145416c

http://www.nessus.org/u?03185644

http://www.nessus.org/u?04468850

http://www.nessus.org/u?04b544a4

http://www.nessus.org/u?0635317e

http://www.nessus.org/u?08a4b452

http://www.nessus.org/u?0b2d5721

http://www.nessus.org/u?11724cdc

http://www.nessus.org/u?14b000ee

http://www.nessus.org/u?1617b4d5

http://www.nessus.org/u?17c80836

http://www.nessus.org/u?1ba41bc2

http://www.nessus.org/u?1c54c46d

http://www.nessus.org/u?1caff3f0

http://www.nessus.org/u?1cb7797c

http://www.nessus.org/u?1e1f6a55

http://www.nessus.org/u?1e25af15

http://www.nessus.org/u?1fccac0c

http://www.nessus.org/u?2111a49b

http://www.nessus.org/u?216e6402

http://www.nessus.org/u?22d5f857

http://www.nessus.org/u?24cfb407

http://www.nessus.org/u?2550e872

http://www.nessus.org/u?275ba44d

http://www.nessus.org/u?29af2776

http://www.nessus.org/u?29e208f3

http://www.nessus.org/u?2a182e87

http://www.nessus.org/u?2eab9984

http://www.nessus.org/u?30dd9c29

http://www.nessus.org/u?31ee0538

http://www.nessus.org/u?3398a24f

http://www.nessus.org/u?33990bb3

http://www.nessus.org/u?355bb246

http://www.nessus.org/u?36ee3691

http://www.nessus.org/u?39ba099b

http://www.nessus.org/u?39e0aba6

http://www.nessus.org/u?3ad50fb8

http://www.nessus.org/u?3b240105

http://www.nessus.org/u?3bc8f7d9

http://www.nessus.org/u?3dffe967

http://www.nessus.org/u?3e57ec05

http://www.nessus.org/u?3e5930a1

http://www.nessus.org/u?3ec2331e

http://www.nessus.org/u?40f921e0

http://www.nessus.org/u?411de45b

http://www.nessus.org/u?44dbecf5

http://www.nessus.org/u?45aabac8

http://www.nessus.org/u?477f4d47

http://www.nessus.org/u?499ce03c

http://www.nessus.org/u?4a0f6c31

http://www.nessus.org/u?4c50533b

http://www.nessus.org/u?4c652b5a

http://www.nessus.org/u?4d36833a

http://www.nessus.org/u?4e761c6d

http://www.nessus.org/u?4e9ae789

http://www.nessus.org/u?4f50618e

http://www.nessus.org/u?51d34d0a

http://www.nessus.org/u?57e45a8e

http://www.nessus.org/u?59b1bc0f

http://www.nessus.org/u?59d302cb

http://www.nessus.org/u?59e39d19

http://www.nessus.org/u?5a5b424c

http://www.nessus.org/u?5c96fcb2

http://www.nessus.org/u?5d1ac41b

http://www.nessus.org/u?5ded3ea3

http://www.nessus.org/u?5e914d44

http://www.nessus.org/u?5e925483

http://www.nessus.org/u?5ec915ee

http://www.nessus.org/u?625e50d1

http://www.nessus.org/u?6598fa0e

http://www.nessus.org/u?659c45e7

http://www.nessus.org/u?65e0ba91

http://www.nessus.org/u?67b455c5

http://www.nessus.org/u?692b7466

http://www.nessus.org/u?69c7824c

http://www.nessus.org/u?6dfe33c6

http://www.nessus.org/u?6e17f130

http://www.nessus.org/u?6ea139f8

http://www.nessus.org/u?6ecb27c2

http://www.nessus.org/u?7050fb9c

http://www.nessus.org/u?70af501f

http://www.nessus.org/u?71cdda4f

http://www.nessus.org/u?7655d69a

http://www.nessus.org/u?776c4cad

http://www.nessus.org/u?77befe9e

http://www.nessus.org/u?79bd591b

http://www.nessus.org/u?79ef26af

http://www.nessus.org/u?7a0624fe

http://www.nessus.org/u?7a1add31

http://www.nessus.org/u?7ca6176e

http://www.nessus.org/u?7da27f5b

http://www.nessus.org/u?849d9ca8

http://www.nessus.org/u?854ce34b

http://www.nessus.org/u?86f27398

http://www.nessus.org/u?87c3128f

http://www.nessus.org/u?88acc973

http://www.nessus.org/u?890411d4

http://www.nessus.org/u?8ae784b2

http://www.nessus.org/u?8db2a9eb

http://www.nessus.org/u?8e741d97

http://www.nessus.org/u?91b6843f

http://www.nessus.org/u?936e173d

http://www.nessus.org/u?96b79c7d

http://www.nessus.org/u?96dfec3d

http://www.nessus.org/u?985a991e

http://www.nessus.org/u?9bf06295

http://www.nessus.org/u?9d24e27f

http://www.nessus.org/u?9d484e64

http://www.nessus.org/u?9e474e9b

http://www.nessus.org/u?9f04b2f0

http://www.nessus.org/u?9f590703

http://www.nessus.org/u?a088c495

http://www.nessus.org/u?a30fcf81

http://www.nessus.org/u?a48b6a8a

http://www.nessus.org/u?a4f5a337

http://www.nessus.org/u?a51d6070

http://www.nessus.org/u?a5a38cc4

http://www.nessus.org/u?a6b08a0e

http://www.nessus.org/u?a86a92b7

http://www.nessus.org/u?abacfb04

http://www.nessus.org/u?ae36bc20

http://www.nessus.org/u?b155f605

http://www.nessus.org/u?b22afcaa

http://www.nessus.org/u?b40ffa99

http://www.nessus.org/u?b6dd162d

http://www.nessus.org/u?b708a10d

http://www.nessus.org/u?b7335b9d

http://www.nessus.org/u?ba14ac55

http://www.nessus.org/u?bafa85db

http://www.nessus.org/u?bb33501d

http://www.nessus.org/u?bbafbc39

http://www.nessus.org/u?bc0acfc9

http://www.nessus.org/u?bd08d693

http://www.nessus.org/u?be3209da

http://www.nessus.org/u?bf6fc885

http://www.nessus.org/u?c1d38f7d

http://www.nessus.org/u?c28d1f70

http://www.nessus.org/u?c2cfbc62

http://www.nessus.org/u?c6efdf3a

http://www.nessus.org/u?c732cfaa

http://www.nessus.org/u?c87e9747

http://www.nessus.org/u?ca7ae6d2

http://www.nessus.org/u?cbe00f72

http://www.nessus.org/u?ccfc5315

http://www.nessus.org/u?d05687f5

http://www.nessus.org/u?d0fa1ff6

http://www.nessus.org/u?d1745da3

http://www.nessus.org/u?d2971f1b

http://www.nessus.org/u?d8317c82

http://www.nessus.org/u?d8791dbc

http://www.nessus.org/u?ddf2169e

http://www.nessus.org/u?df023bb4

http://www.nessus.org/u?dfeba5da

http://www.nessus.org/u?e011344f

http://www.nessus.org/u?e08bfa94

http://www.nessus.org/u?e0c8cfa2

http://www.nessus.org/u?e0e80f71

http://www.nessus.org/u?e3aaff81

http://www.nessus.org/u?e44e0d7a

http://www.nessus.org/u?e5827ba7

http://www.nessus.org/u?e8162413

http://www.nessus.org/u?ea2e6f13

http://www.nessus.org/u?eaa1b2bd

http://www.nessus.org/u?eb021389

http://www.nessus.org/u?eb11809f

http://www.nessus.org/u?ec0de7fe

http://www.nessus.org/u?ec66bee4

http://www.nessus.org/u?ed72e0a3

http://www.nessus.org/u?edfe969d

http://www.nessus.org/u?ee8c457e

http://www.nessus.org/u?f0c50627

http://www.nessus.org/u?f0eb006a

http://www.nessus.org/u?f112e750

http://www.nessus.org/u?f1884eb6

http://www.nessus.org/u?f2169cd1

http://www.nessus.org/u?f6427dfc

http://www.nessus.org/u?fa28f22b

http://www.nessus.org/u?fa9d73e6

http://www.nessus.org/u?fefeb150

Plugin Details

Severity: Critical

ID: 199257

File Name: redhat_unpatched_kernel-rhel5.nasl

Version: 1.15

Type: local

Agent: unix

Published: 6/3/2024

Updated: 10/22/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2017-18017

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:kernel, cpe:/o:redhat:enterprise_linux:5

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 1/23/2012

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Reliable Datagram Sockets (RDS) rds_atomic_free_op NULL pointer dereference Privilege Escalation)

Reference Information

CVE: CVE-2006-3635, CVE-2007-6761, CVE-2010-5328, CVE-2010-5329, CVE-2012-0056, CVE-2012-6701, CVE-2013-4312, CVE-2013-6380, CVE-2013-6382, CVE-2013-7266, CVE-2013-7267, CVE-2013-7268, CVE-2013-7269, CVE-2013-7270, CVE-2013-7271, CVE-2013-7446, CVE-2014-3673, CVE-2014-5471, CVE-2014-5472, CVE-2014-6410, CVE-2014-8133, CVE-2014-8709, CVE-2014-9419, CVE-2014-9420, CVE-2014-9584, CVE-2014-9585, CVE-2014-9731, CVE-2015-1142857, CVE-2015-1350, CVE-2015-2042, CVE-2015-2150, CVE-2015-2877, CVE-2015-3288, CVE-2015-3339, CVE-2015-4167, CVE-2015-5156, CVE-2015-5157, CVE-2015-5257, CVE-2015-5275, CVE-2015-5283, CVE-2015-6937, CVE-2015-7509, CVE-2015-7515, CVE-2015-7550, CVE-2015-7799, CVE-2015-7990, CVE-2015-8215, CVE-2015-8543, CVE-2015-8553, CVE-2015-8575, CVE-2015-8767, CVE-2015-8812, CVE-2015-8952, CVE-2015-8956, CVE-2015-8964, CVE-2016-0723, CVE-2016-0774, CVE-2016-0821, CVE-2016-10741, CVE-2016-2069, CVE-2016-2184, CVE-2016-2185, CVE-2016-2186, CVE-2016-2543, CVE-2016-2544, CVE-2016-2545, CVE-2016-2546, CVE-2016-2547, CVE-2016-2550, CVE-2016-2847, CVE-2016-3134, CVE-2016-3138, CVE-2016-3139, CVE-2016-3140, CVE-2016-3156, CVE-2016-3157, CVE-2016-3672, CVE-2016-3951, CVE-2016-4482, CVE-2016-4486, CVE-2016-4569, CVE-2016-4578, CVE-2016-4580, CVE-2016-4913, CVE-2016-5244, CVE-2016-5829, CVE-2016-6130, CVE-2016-6480, CVE-2016-7042, CVE-2016-7097, CVE-2016-7425, CVE-2016-7915, CVE-2016-8405, CVE-2016-9685, CVE-2016-9794, CVE-2017-0627, CVE-2017-0630, CVE-2017-0861, CVE-2017-1000370, CVE-2017-1000371, CVE-2017-1000380, CVE-2017-11473, CVE-2017-12190, CVE-2017-12762, CVE-2017-13166, CVE-2017-13167, CVE-2017-13693, CVE-2017-13694, CVE-2017-13695, CVE-2017-14051, CVE-2017-14140, CVE-2017-15102, CVE-2017-15274, CVE-2017-16532, CVE-2017-16534, CVE-2017-16536, CVE-2017-16537, CVE-2017-16644, CVE-2017-16646, CVE-2017-16647, CVE-2017-16649, CVE-2017-16650, CVE-2017-17558, CVE-2017-17807, CVE-2017-18017, CVE-2017-18079, CVE-2017-18360, CVE-2017-5549, CVE-2017-5551, CVE-2017-5986, CVE-2017-6348, CVE-2017-7542, CVE-2017-7616, CVE-2017-7889, CVE-2017-8890, CVE-2017-8924, CVE-2017-8925, CVE-2017-9074, CVE-2017-9075, CVE-2017-9076, CVE-2017-9077, CVE-2018-1000004, CVE-2018-10675, CVE-2018-10902, CVE-2018-1092, CVE-2018-10940, CVE-2018-1120, CVE-2018-1130, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2018-12207, CVE-2018-12928, CVE-2018-13405, CVE-2018-14617, CVE-2018-14734, CVE-2018-16658, CVE-2018-16885, CVE-2018-17977, CVE-2018-18710, CVE-2018-20169, CVE-2018-20836, CVE-2018-5333, CVE-2018-5390, CVE-2018-5391, CVE-2018-5803, CVE-2018-6927, CVE-2018-7492, CVE-2018-7757, CVE-2018-9516, CVE-2018-9568, CVE-2019-0154, CVE-2019-11091, CVE-2019-11184, CVE-2019-3459

IAVA: 2018-A-0174-S, 2019-A-0166