Rapid7 Vulnerability & Exploit Database

USN-625-1: Linux kernel vulnerabilities

Back to Search

USN-625-1: Linux kernel vulnerabilities

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
06/09/2008
Created
07/25/2018
Added
05/06/2013
Modified
07/09/2020

Description

The asn1 implementation in (a) the Linux kernel 2.4 before 2.4.36.6 and 2.6 before 2.6.25.5, as used in the cifs and ip_nat_snmp_basic modules; and (b) the gxsnmp package; does not properly validate length values during decoding of ASN.1 BER data, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) a length greater than the working buffer, which can lead to an unspecified overflow; (2) an oid length of zero, which can lead to an off-by-one error; or (3) an indefinite length for a primitive encoding.

Solution(s)

  • ubuntu-upgrade-linux-image-2-6-20-17-386
  • ubuntu-upgrade-linux-image-2-6-20-17-generic
  • ubuntu-upgrade-linux-image-2-6-20-17-hppa32
  • ubuntu-upgrade-linux-image-2-6-20-17-hppa64
  • ubuntu-upgrade-linux-image-2-6-20-17-itanium
  • ubuntu-upgrade-linux-image-2-6-20-17-lowlatency
  • ubuntu-upgrade-linux-image-2-6-20-17-mckinley
  • ubuntu-upgrade-linux-image-2-6-20-17-powerpc
  • ubuntu-upgrade-linux-image-2-6-20-17-powerpc-smp
  • ubuntu-upgrade-linux-image-2-6-20-17-powerpc64-smp
  • ubuntu-upgrade-linux-image-2-6-20-17-server
  • ubuntu-upgrade-linux-image-2-6-20-17-server-bigiron
  • ubuntu-upgrade-linux-image-2-6-20-17-sparc64
  • ubuntu-upgrade-linux-image-2-6-20-17-sparc64-smp
  • ubuntu-upgrade-linux-image-2-6-22-15-386
  • ubuntu-upgrade-linux-image-2-6-22-15-cell
  • ubuntu-upgrade-linux-image-2-6-22-15-generic
  • ubuntu-upgrade-linux-image-2-6-22-15-hppa32
  • ubuntu-upgrade-linux-image-2-6-22-15-hppa64
  • ubuntu-upgrade-linux-image-2-6-22-15-itanium
  • ubuntu-upgrade-linux-image-2-6-22-15-lpia
  • ubuntu-upgrade-linux-image-2-6-22-15-lpiacompat
  • ubuntu-upgrade-linux-image-2-6-22-15-mckinley
  • ubuntu-upgrade-linux-image-2-6-22-15-powerpc
  • ubuntu-upgrade-linux-image-2-6-22-15-powerpc-smp
  • ubuntu-upgrade-linux-image-2-6-22-15-powerpc64-smp
  • ubuntu-upgrade-linux-image-2-6-22-15-rt
  • ubuntu-upgrade-linux-image-2-6-22-15-server
  • ubuntu-upgrade-linux-image-2-6-22-15-sparc64
  • ubuntu-upgrade-linux-image-2-6-22-15-sparc64-smp
  • ubuntu-upgrade-linux-image-2-6-22-15-ume
  • ubuntu-upgrade-linux-image-2-6-22-15-virtual
  • ubuntu-upgrade-linux-image-2-6-22-15-xen
  • ubuntu-upgrade-linux-image-2-6-24-19-386
  • ubuntu-upgrade-linux-image-2-6-24-19-generic
  • ubuntu-upgrade-linux-image-2-6-24-19-hppa32
  • ubuntu-upgrade-linux-image-2-6-24-19-hppa64
  • ubuntu-upgrade-linux-image-2-6-24-19-itanium
  • ubuntu-upgrade-linux-image-2-6-24-19-lpia
  • ubuntu-upgrade-linux-image-2-6-24-19-lpiacompat
  • ubuntu-upgrade-linux-image-2-6-24-19-mckinley
  • ubuntu-upgrade-linux-image-2-6-24-19-openvz
  • ubuntu-upgrade-linux-image-2-6-24-19-powerpc
  • ubuntu-upgrade-linux-image-2-6-24-19-powerpc-smp
  • ubuntu-upgrade-linux-image-2-6-24-19-powerpc64-smp
  • ubuntu-upgrade-linux-image-2-6-24-19-rt
  • ubuntu-upgrade-linux-image-2-6-24-19-server
  • ubuntu-upgrade-linux-image-2-6-24-19-sparc64
  • ubuntu-upgrade-linux-image-2-6-24-19-sparc64-smp
  • ubuntu-upgrade-linux-image-2-6-24-19-virtual
  • ubuntu-upgrade-linux-image-2-6-24-19-xen

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;