CVE编号
CVE-2007-1000利用情况
暂无补丁情况
官方补丁披露时间
2007-03-13漏洞描述
2.6.20.2之前的Linux内核中的net / ipv6 / ipv6_sockglue.c中的ipv6_getsockopt_sticky函数允许本地用户通过触发NULL解除引用的某些getsockopt调用来读取任意内核内存。解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://bugzilla.kernel.org/show_bug.cgi?id=8134 | |
http://fedoranews.org/cms/node/2787 | |
http://fedoranews.org/cms/node/2788 | |
http://lists.suse.com/archive/suse-security-announce/2007-May/0001.html | |
http://secunia.com/advisories/24493 | |
http://secunia.com/advisories/24518 | |
http://secunia.com/advisories/24777 | |
http://secunia.com/advisories/24901 | |
http://secunia.com/advisories/25080 | |
http://secunia.com/advisories/25099 | |
http://secunia.com/advisories/25691 | |
http://secunia.com/advisories/26133 | |
http://secunia.com/advisories/26139 | |
http://www.kb.cert.org/vuls/id/920689 | |
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.2 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2007:078 | |
http://www.osvdb.org/33025 | |
http://www.redhat.com/support/errata/RHSA-2007-0169.html | |
http://www.securityfocus.com/archive/1/471457 | |
http://www.securityfocus.com/bid/22904 | |
http://www.ubuntu.com/usn/usn-486-1 | |
http://www.ubuntu.com/usn/usn-489-1 | |
http://www.vupen.com/english/advisories/2007/0907 | |
http://www.wslabi.com/wabisabilabi/initPublishedBid.do? | |
https://issues.rpath.com/browse/RPL-1153 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | centos_5 | kernel | * |
Up to (excluding) 2.6.18-8.1.3.el5 |
|||||
运行在以下环境 | |||||||||
系统 | linux | linux_kernel | * |
Up to (including) 2.6.20.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle linux_5 | kernel | * |
Up to (excluding) 2.6.18-8.1.4.0.1.el5 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_5 | kernel | * |
Up to (excluding) 2.6.18-8.1.4.0.1.el5 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_5 | kernel | * |
Up to (excluding) 0:2.6.18-8.1.3.el5 |
|||||
- 攻击路径 本地
- 攻击复杂度 容易
- 权限要求 无需权限
- 影响范围 全局影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 数据泄露
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 N/A
还没有评论,来说两句吧...