Mandriva Linux Security Advisory : kernel (MDVSA-2008:043)

high Nessus Plugin ID 36383

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

A flaw in the vmsplice system call did not properly verify address arguments passed by user-space processes, which allowed local attackers to overwrite arbitrary kernel memory and gain root privileges.

Mandriva urges all users to upgrade to these new kernels immediately as this flaw is being actively exploited. This issue only affects 2.6.17 and newer Linux kernels, so neither Corporate 3.0 nor Corporate 4.0 are affected.

To update your kernel, please follow the directions located at :

http://www.mandriva.com/en/security/kernelupdate

Solution

Update the affected packages.

Plugin Details

Severity: High

ID: 36383

File Name: mandriva_MDVSA-2008-043.nasl

Version: 1.17

Type: local

Published: 4/23/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:kernel-2.6.17.17mdv, p-cpe:/a:mandriva:linux:kernel-doc-2.6.17.17mdv, p-cpe:/a:mandriva:linux:kernel-doc-latest, p-cpe:/a:mandriva:linux:kernel-enterprise-2.6.17.17mdv, p-cpe:/a:mandriva:linux:kernel-enterprise-latest, p-cpe:/a:mandriva:linux:kernel-latest, p-cpe:/a:mandriva:linux:kernel-legacy-2.6.17.17mdv, p-cpe:/a:mandriva:linux:kernel-legacy-latest, p-cpe:/a:mandriva:linux:kernel-source-2.6.17.17mdv, p-cpe:/a:mandriva:linux:kernel-source-latest, p-cpe:/a:mandriva:linux:kernel-source-stripped-2.6.17.17mdv, p-cpe:/a:mandriva:linux:kernel-source-stripped-latest, p-cpe:/a:mandriva:linux:kernel-xen0-2.6.17.17mdv, p-cpe:/a:mandriva:linux:kernel-xen0-latest, p-cpe:/a:mandriva:linux:kernel-xenu-2.6.17.17mdv, p-cpe:/a:mandriva:linux:kernel-xenu-latest, cpe:/o:mandriva:linux:2007, cpe:/o:mandriva:linux:2007.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/11/2008

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2008-0009, CVE-2008-0010, CVE-2008-0600

CWE: 20, 94

MDVSA: 2008:043