linuxducks.free-forums.org

LinuxDucks Forum Linux Operating System Club
It is currently Wed Dec 12, 2018 7:22 am

All times are UTC - 4 hours [ DST ]




Post new topic Reply to topic  [ 1 post ] 
Author Message
 Post subject: US-CERT Current Activity - Linux Root Access Vulnerabilities
PostPosted: Sun May 01, 2011 4:12 am 
Offline
Site Admin

Joined: Sat Apr 30, 2011 4:33 am
Posts: 1530
Location: USA
Fw: US-CERT Current Activity - Linux Root Access Vulnerabilities

--------------------------------------------------
From: "Current Activity" <us-cert@...>
Sent: Monday, October 25, 2010 12:03 PM
To: "Current Activity" <current-activity@...>
Subject: US-CERT Current Activity - Linux Root Access Vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

US-CERT Current Activity

Linux Root Access Vulnerabilities

Original release date: October 25, 2010 at 10:31 am
Last revised: October 25, 2010 at 10:31 am


US-CERT is aware of public reports of multiple vulnerabilities
affecting Linux. Exploitation of these vulnerabilities may allow an
attacker to access the system with root or "superuser" privileges.

The first of these vulnerabilities is due to a flaw in the
implementation of the Reliable Datagram Sockets (RDS) protocol in
Linux kernel versions 2.6.30 through 2.6.36-rc8. By sending a
specially crafted socket function call, an attacker may be able to
write arbitrary values into kernel memory and escalate privileges to
root.

This vulnerability affects Linux installations where the CONFIG_RDS
kernel configuration option is set and where there are no restrictions
preventing unprivileged users from loading packet family modules.
Reports indicate that this may be the default configuration and that a
patch for this vulnerability has been committed to the Linux kernel.
Users should apply any updates for their Linux distributions to help
mitigate the risks. Additionally, reports indicate that preventing the
RDS kernel module from loading is an effective workaround. This can be
performed by executing the following command as root:
* echo "alias net-pf-21 off" > /etc/modprobe.d/disable-rds

The second vulnerability is due to a flaw in the library loader of the
GNU C library. Exploitation of this vulnerability may allow an
attacker to gain root privileges. Reports indicate that patches have
not yet been released to address this issue.

US-CERT will provide additional information as it becomes available.
====
This entry is available at
http://www.us-cert.gov/current/index.ht ... rabilities

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBTMWqRT6pPKYJORa3AQKmjgf+NoghT77JMj+U5AmBYy6Hy8bd51NNVr6u
tVnIwCD3VgAgC2IIUpObKLGYLQZe2x1J27bz9pcOHUhxQhRDv8vbrISp+MufZgBE
UN9aMDWvNYWkCL16fbHa9A0UhVhIav6APR90MREXLwzsZyLgsMXCsCJ3DPJnB4jh
4ZGok3mkMA+CaWrgcX3Rypz4NXTYHrw+vDgECRzqSgklrmmh2U2VKtB/Cmu5dskV
lXbkD3grrK2jDa7pht944YJo8T3BzJdy/3n48XRBAU+Qy5H03GpGkIKl3kjmXhmO
XcgWvC9TtHleploWjH7u0PwamcCHuc737VQBmLDRCGamVGdSZjYuLg==
=PQ7V
-----END PGP SIGNATURE-----

_________________
ADMINISTRATOR / FORUM OWNER
HOME: http://linuxducks.webs.com/
https://sites.google.com/site/linuxducks/home
http://tech.groups.yahoo.com/group/linuxducks/
Web: https://sites.google.com/site/pcsecurityhelper/
Malware Removal / Amatuer Forensics


Top
 Profile  
 
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 1 post ] 

All times are UTC - 4 hours [ DST ]


Who is online

Users browsing this forum: No registered users and 1 guest


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
Jump to:  
cron
Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group
Design by fragilix © 2008 based on subsilver2.

This site is hosted by Free-Forums.org - get a forum for free. Get coupon codes.
MultiForums powered by echoPHP phpBB MultiForums