Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.841626 |
Categoría: | Ubuntu Local Security Checks |
Título: | Ubuntu Update for linux USN-2021-1 |
Resumen: | The remote host is missing an update for the 'linux'; package(s) announced via the referenced advisory. |
Descripción: | Summary: The remote host is missing an update for the 'linux' package(s) announced via the referenced advisory. Vulnerability Insight: An information leak was discovered in the handling of ICMPv6 Router Advertisement (RA) messages in the Linux kernel's IPv6 network stack. A remote attacker could exploit this flaw to cause a denial of service (excessive retries and address-generation outage), and consequently obtain sensitive information. (CVE-2013-0343) Kees Cook discovered flaw in the Human Interface Device (HID) subsystem of the Linux kernel. A physically proximate attacker could exploit this flaw to execute arbitrary code or cause a denial of service (heap memory corruption) via a specially crafted device that provides an invalid Report ID. (CVE-2013-2888) Kees Cook discovered flaw in the Human Interface Device (HID) subsystem when CONFIG_HID_ZEROPLUS is enabled. A physically proximate attacker could leverage this flaw to cause a denial of service via a specially crafted device. (CVE-2013-2889) Kees Cook discovered a flaw in the Human Interface Device (HID) subsystem of the Linux kernel when CONFIG_HID_PANTHERLORD is enabled. A physically proximate attacker could cause a denial of service (heap out-of-bounds write) via a specially crafted device. (CVE-2013-2892) Kees Cook discovered another flaw in the Human Interface Device (HID) subsystem of the Linux kernel when any of CONFIG_LOGITECH_FF, CONFIG_LOGIG940_FF, or CONFIG_LOGIWHEELS_FF are enabled. A physcially proximate attacker can leverage this flaw to cause a denial of service vias a specially crafted device. (CVE-2013-2893) Kees Cook discovered another flaw in the Human Interface Device (HID) subsystem of the Linux kernel when CONFIG_HID_LOGITECH_DJ is enabled. A physically proximate attacker could cause a denial of service (OOPS) or obtain sensitive information from kernel memory via a specially crafted device. (CVE-2013-2895) Kees Cook discovered a vulnerability in the Linux Kernel's Human Interface Device (HID) subsystem's support for N-Trig touch screens. A physically proximate attacker could exploit this flaw to cause a denial of service (OOPS) via a specially crafted device. (CVE-2013-2896) Kees Cook discovered yet another flaw in the Human Interface Device (HID) subsystem of the Linux kernel when CONFIG_HID_MULTITOUCH is enabled. A physically proximate attacker could leverage this flaw to cause a denial of service (OOPS) via a specially crafted device. (CVE-2013-2897) Kees Cook discovered a flaw in the Human Interface Device (HID) subsystem of the Linux kernel when CONFIG_HID_PICOLCD is enabled. A physically proximate attacker could exploit this flaw to cause a denial of service (OOPS) via a specially crafted device. (CVE-2013-2899) Alan Chester reported ... Description truncated, please see the referenced URL(s) for more information. Affected Software/OS: linux on Ubuntu 12.10 Solution: Please Install the Updated Packages. CVSS Score: 6.2 CVSS Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-0343 http://openwall.com/lists/oss-security/2012/12/05/4 http://openwall.com/lists/oss-security/2013/01/16/7 http://openwall.com/lists/oss-security/2013/01/21/11 http://www.openwall.com/lists/oss-security/2013/02/22/6 RedHat Security Advisories: RHSA-2013:1449 http://rhn.redhat.com/errata/RHSA-2013-1449.html RedHat Security Advisories: RHSA-2013:1490 http://rhn.redhat.com/errata/RHSA-2013-1490.html RedHat Security Advisories: RHSA-2013:1645 http://rhn.redhat.com/errata/RHSA-2013-1645.html SuSE Security Announcement: openSUSE-SU-2014:0204 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html http://www.ubuntu.com/usn/USN-1976-1 http://www.ubuntu.com/usn/USN-1977-1 http://www.ubuntu.com/usn/USN-2019-1 http://www.ubuntu.com/usn/USN-2020-1 http://www.ubuntu.com/usn/USN-2021-1 http://www.ubuntu.com/usn/USN-2022-1 http://www.ubuntu.com/usn/USN-2023-1 http://www.ubuntu.com/usn/USN-2024-1 http://www.ubuntu.com/usn/USN-2038-1 http://www.ubuntu.com/usn/USN-2039-1 http://www.ubuntu.com/usn/USN-2050-1 Common Vulnerability Exposure (CVE) ID: CVE-2013-2888 Debian Security Information: DSA-2766 (Google Search) http://www.debian.org/security/2013/dsa-2766 http://marc.info/?l=linux-input&m=137772180514608&w=1 http://openwall.com/lists/oss-security/2013/08/28/13 http://www.ubuntu.com/usn/USN-1995-1 http://www.ubuntu.com/usn/USN-1998-1 Common Vulnerability Exposure (CVE) ID: CVE-2013-2889 BugTraq ID: 62042 http://www.securityfocus.com/bid/62042 http://marc.info/?l=linux-input&m=137772182014614&w=1 http://www.ubuntu.com/usn/USN-2015-1 http://www.ubuntu.com/usn/USN-2016-1 Common Vulnerability Exposure (CVE) ID: CVE-2013-2892 BugTraq ID: 62049 http://www.securityfocus.com/bid/62049 http://marc.info/?l=linux-input&m=137772185414625&w=1 Common Vulnerability Exposure (CVE) ID: CVE-2013-2893 BugTraq ID: 62050 http://www.securityfocus.com/bid/62050 http://marc.info/?l=linux-input&m=137772186714627&w=1 SuSE Security Announcement: SUSE-SU-2015:0481 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html SuSE Security Announcement: openSUSE-SU-2015:0566 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html Common Vulnerability Exposure (CVE) ID: CVE-2013-2895 http://marc.info/?l=linux-input&m=137772188314631&w=1 Common Vulnerability Exposure (CVE) ID: CVE-2013-2896 http://marc.info/?l=linux-input&m=137772189314633&w=1 Common Vulnerability Exposure (CVE) ID: CVE-2013-2897 BugTraq ID: 62044 http://www.securityfocus.com/bid/62044 http://marc.info/?l=linux-input&m=137772190214635&w=1 Common Vulnerability Exposure (CVE) ID: CVE-2013-2899 http://marc.info/?l=linux-input&m=137772191714649&w=1 Common Vulnerability Exposure (CVE) ID: CVE-2013-4350 http://www.openwall.com/lists/oss-security/2013/09/13/3 http://www.ubuntu.com/usn/USN-2041-1 http://www.ubuntu.com/usn/USN-2045-1 http://www.ubuntu.com/usn/USN-2049-1 Common Vulnerability Exposure (CVE) ID: CVE-2013-4387 http://www.openwall.com/lists/oss-security/2013/09/29/1 RedHat Security Advisories: RHSA-2014:0284 http://rhn.redhat.com/errata/RHSA-2014-0284.html |
Copyright | Copyright (C) 2013 Greenbone Networks GmbH |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |