BDU:2015-03380

Vulnerability from fstec - Published: 05.01.2004
VLAI Severity ?
Title
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Description
Множественные уязвимости пакета kernel-headers-2.4.18-sparc операционной системы Debian GNU/Linux, эксплуатация которых может привести к нарушению конфиденциальности, целостности и доступности защищаемой информации. Эксплуатация уязвимостей может быть осуществлена удаленно
Severity ?
Vendor
Сообщество свободного программного обеспечения
Software Name
Debian GNU/Linux
Software Version
до 3.0 (Debian GNU/Linux)
Possible Mitigations
Проблема может быть решена обновлением операционной системы до следующих версий пакетов в зависимости от архитектуры: Debian GNU/Linux 3.0: mips: kernel-headers-2.4.19 - 2.4.19-0.020911.1.woody5 kernel-image-2.4.19-r4k-ip22 - 2.4.19-0.020911.1.woody5 kernel-image-2.4.19-r5k-ip22 - 2.4.19-0.020911.1.woody5 mips-tools - 2.4.19-0.020911.1.woody5 sparc: kernel-image-2.4.18-sun4u - 22woody1 kernel-image-2.4.18-sun4u-smp - 22woody1 kernel-image-2.4.19-sun4u - 26woody1 kernel-image-2.4.19-sun4u-smp - 26woody1 noarch: kernel-headers-2.4.18-sparc - 22woody1 kernel-headers-2.4.19-sparc - 26woody1 kernel-patch-2.4.19-mips - 2.4.19-0.020911.1.woody5 kernel-doc-2.4.19 - 2.4.19-4.woody3 kernel-source-2.4.19 - 2.4.19-4.wood
Reference
http://www.debian.org/security/dsa-1070/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1073 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1072 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1071 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1070 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0504 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0135 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1333 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1335 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0447 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0565 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0554 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0427 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0394 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0984 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0138 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0685 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0489 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0003 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0001 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0949 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0997 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0384 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1074 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1234 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0883 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1068 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1235 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0124 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1017 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1016

{
  "CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
  "CVSS 3.0": null,
  "CVSS 4.0": null,
  "remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
  "remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
  "\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 3.0 (Debian GNU/Linux)",
  "\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0440\u0435\u0448\u0435\u043d\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0434\u043e \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u0439 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u0432 \u0437\u0430\u0432\u0438\u0441\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0442 \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b:\nDebian GNU/Linux 3.0:\n\tmips:\n\t\tkernel-headers-2.4.19 - 2.4.19-0.020911.1.woody5\n\t\tkernel-image-2.4.19-r4k-ip22 - 2.4.19-0.020911.1.woody5\n\t\tkernel-image-2.4.19-r5k-ip22 - 2.4.19-0.020911.1.woody5\n\t\tmips-tools - 2.4.19-0.020911.1.woody5\n\tsparc:\n\t\tkernel-image-2.4.18-sun4u - 22woody1\n\t\tkernel-image-2.4.18-sun4u-smp - 22woody1\n\t\tkernel-image-2.4.19-sun4u - 26woody1\n\t\tkernel-image-2.4.19-sun4u-smp - 26woody1\n\tnoarch:\n\t\tkernel-headers-2.4.18-sparc - 22woody1\n\t\tkernel-headers-2.4.19-sparc - 26woody1\n\t\tkernel-patch-2.4.19-mips - 2.4.19-0.020911.1.woody5\n\t\tkernel-doc-2.4.19 - 2.4.19-4.woody3\n\t\tkernel-source-2.4.19 - 2.4.19-4.wood",
  "\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "05.01.2004",
  "\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "05.07.2024",
  "\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "28.04.2015",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2015-03380",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2003-0984, CVE-2004-0138, CVE-2004-0394, CVE-2004-0427, CVE-2004-0447, CVE-2004-0554, CVE-2004-0565, CVE-2004-0685, CVE-2004-0883, CVE-2004-0949, CVE-2004-0997, CVE-2004-1016, CVE-2004-1017, CVE-2004-1068, CVE-2004-1070, CVE-2004-1071, CVE-2004-1072, CVE-2004-1073, CVE-2004-1074, CVE-2004-1234, CVE-2004-1235, CVE-2004-1333, CVE-2004-1335, CVE-2005-0001, CVE-2005-0003, CVE-2005-0124, CVE-2005-0135, CVE-2005-0384, CVE-2005-0489, CVE-2005-0504, DSA-107, ID:1401982",
  "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
  "\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
  "\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Debian GNU/Linux",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Debian\u00a0GNU/Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0435 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c, \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
  "\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": null,
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u0430\u043a\u0435\u0442\u0430 kernel-headers-2.4.18-sparc \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Debian\u00a0GNU/Linux, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u044e \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u0438, \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u0438 \u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u0438  \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u0435\u043d\u0430 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e",
  "\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
  "\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
  "\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://www.debian.org/security/dsa-1070/\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1073\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1072\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1071\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1070\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0504\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0135\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1333\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1335\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0447\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0565\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0554\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0427\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0394\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0984\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0138\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0685\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0489\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0003\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0001\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0949\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0997\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0384\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1074\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1234\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0883\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1068\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1235\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0124\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1017\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1016",
  "\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
  "\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
  "\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": null,
  "\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…