漏洞信息详情
Linux内核ATM子系统’clip.c’ clip_mkip函数远程拒绝服务漏洞
- CNNVD编号:CNNVD-200610-085
- 危害等级: 高危
- CVE编号:
CVE-2006-4997
- 漏洞类型:
设计错误
- 发布时间:
2006-10-10
- 威胁类型:
远程
- 更新时间:
2006-10-23
- 厂 商:
linux - 漏洞来源:
ADLab is credited … -
漏洞简介
Linux内核ATM子系统的net/atm/clip.c中的clip_mkip函数存在远程拒绝服务漏洞。远程攻击者通过未知矢量使ATM子系统在套接字缓冲区内存被释放后访问该内存(释放的指针取消引用),以此使系统拒绝服务(呼救)。
漏洞公告
目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
Linux kernel 2.6.17
Ubuntu affs-modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu 6.10:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/affs -modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu affs-modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu 6.10:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/affs -modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu cdrom-core-modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu 6.10:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdro m-core-modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu cdrom-core-modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu 6.10:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdro m-core-modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu cdrom-core-modules-2.6.17-10-sparc64-di_2.6.17.1-10.34_sparc.udeb
Ubuntu 6.10:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdro m-core-modules-2.6.17-10-sparc64-di_2.6.17.1-10.34_sparc.udeb
Ubuntu crc-modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu 6.10:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc- modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu crc-modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu 6.10:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc- modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu crc-modules-2.6.17-10-sparc64-di_2.6.17.1-10.34_sparc.udeb
Ubuntu 6.10:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc- modules-2.6.17-10-sparc64-di_2.6.17.1-10.34_sparc.udeb
Ubuntu ext2-modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu 6.10:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2 -modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu ext2-modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu 6.10:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2 -modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu ext2-modules-2.6.17-10-sparc64-di_2.6.17.1-10.34_sparc.udeb
Ubuntu 6.10:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2 -modules-2.6.17-10-sparc64-di_2.6.17.1-10.34_sparc.udeb
Ubuntu ext3-modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu 6.10:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3 -modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu ext3-modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu 6.10:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3 -modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu ext3-modules-2.6.17-10-sparc64-di_2.6.17.1-10.34_sparc.udeb
Ubuntu 6.10:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3 -modules-2.6.17-10-sparc64-di_2.6.17.1-10.34_sparc.udeb
Ubuntu fat-modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu 6.10:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fat- modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu fb-modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu 6.10:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fb-m odules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu fb-modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu 6.10:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fb-m odules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu firewire-core-modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu 6.10:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fire wire-core-modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb
Ubuntu firewire-core-modules-2.6.17-10-powerpc64
参考网址
来源: REDHAT
名称: RHSA-2006:0689
链接:http://www.redhat.com/support/errata/RHSA-2006-0689.html
来源: VUPEN
名称: ADV-2006-3999
链接:http://www.frsirt.com/english/advisories/2006/3999
来源: VUPEN
名称: ADV-2006-3937
链接:http://www.frsirt.com/english/advisories/2006/3937
来源: SECUNIA
名称: 22292
链接:http://secunia.com/advisories/22292
来源: SECUNIA
名称: 22279
链接:http://secunia.com/advisories/22279
来源: XF
名称: kernel-clipmkip-dos(29387)
链接:http://xforce.iss.net/xforce/xfdb/29387
来源: DEBIAN
名称: DSA-1237
链接:http://www.us.debian.org/security/2006/dsa-1237
来源: DEBIAN
名称: DSA-1233
链接:http://www.us.debian.org/security/2006/dsa-1233
来源: UBUNTU
名称: USN-395-1
链接:http://www.ubuntu.com/usn/usn-395-1
来源: BID
名称: 20363
链接:http://www.securityfocus.com/bid/20363
来源: BUGTRAQ
名称: 20070615 rPSA-2007-0124-1 kernel xen
链接:http://www.securityfocus.com/archive/1/471457
来源: REDHAT
名称: RHSA-2007:0013
链接:http://www.redhat.com/support/errata/RHSA-2007-0013.html
来源: REDHAT
名称: RHSA-2007:0012
链接:http://www.redhat.com/support/errata/RHSA-2007-0012.html
来源: REDHAT
名称: RHSA-2006:0710
链接:http://www.redhat.com/support/errata/RHSA-2006-0710.html
来源: SUSE
名称: SUSE-SA:2006:079
链接:http://www.novell.com/linux/security/advisories/2006_79_kernel.html
来源: MANDRIVA
名称: MDKSA-2007:025
链接:http://www.mandriva.com/security/advisories?name=MDKSA-2007:025
来源: MANDRIVA
名称: MDKSA-2007:012
链接:http://www.mandriva.com/security/advisories?name=MDKSA-2007:012
来源: MANDRIVA
名称: MDKSA-2006:197
链接:http://www.mandriva.com/security/advisories?name=MDKSA-2006:197
来源: www.kernel.org
来源: support.avaya.com
链接:http://support.avaya.com/elmodocs2/security/ASA-2007-078.htm
来源: support.avaya.com
链接:http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm
来源: support.avaya.com
链接:http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm
来源: SECTRACK
名称: 1017526
链接:http://securitytracker.com/id?1017526
来源: SECUNIA
名称: 25691
链接:http://secunia.com/advisories/25691
来源: SECUNIA
名称: 24288
链接:http://secunia.com/advisories/24288
来源: SECUNIA
名称: 23788
链接:http://secunia.com/advisories/23788
来源: SECUNIA
名称: 23752
链接:http://secunia.com/advisories/23752
来源: SECUNIA
名称: 23474
链接:http://secunia.com/advisories/23474
来源: SECUNIA
名称: 23395
链接:http://secunia.com/advisories/23395
来源: SECUNIA
名称: 23384
链接:http://secunia.com/advisories/23384
来源: SECUNIA
名称: 23370
链接:http://secunia.com/advisories/23370
来源: SECUNIA
名称: 23064
链接:http://secunia.com/advisories/23064
来源: SECUNIA
名称: 22945
链接:http://secunia.com/advisories/22945
来源: SECUNIA
名称: 22762
链接:http://secunia.com/advisories/22762
来源: SECUNIA
名称: 22497
链接:http://secunia.com/advisories/22497
来源: SECUNIA
名称: 22253
链接:http://secunia.com/advisories/22253
来源: MANDRIVA
名称: MDKSA-2007:025
链接:http://frontal2.mandriva.com/security/advisories?name=MDKSA-2007:025
来源: MANDRIVA
名称: MDKSA-2007:012
链接:http://frontal2.mandriva.com/security/advisories?name=MDKSA-2007:012
来源: MANDRIVA
名称: MDKSA-2006:197
链接:http://frontal2.mandriva.com/security/advisories?name=MDKSA-2006:197
来源: bugzilla.redhat.com
链接:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=206265