BDU:2015-02783

Scores

EPSS

0.000none0.0%
0%20%40%60%80%100%

Percentile: 0.0%

CVSS

5.0medium2.0
0246810

CVSS Score: 5.0/10

All CVSS Scores

CVSS 2.0
5.0

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Description

Множественные уязвимости пакета kernel-tree-2.4.27 операционной системы Debian GNU/Linux, эксплуатация которых может привести к нарушению доступности защищаемой информации. Эксплуатация уязвимостей может быть осуществлена удаленно

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

bdu

Exploits

Exploit ID: 12

Source: exploitdb

URL: https://www.exploit-db.com/exploits/12

Exploit ID: 129

Source: exploitdb

URL: https://www.exploit-db.com/exploits/129

Exploit ID: 131

Source: exploitdb

URL: https://www.exploit-db.com/exploits/131

Exploit ID: 141

Source: exploitdb

URL: https://www.exploit-db.com/exploits/141

Exploit ID: 142

Source: exploitdb

URL: https://www.exploit-db.com/exploits/142

Exploit ID: 145

Source: exploitdb

URL: https://www.exploit-db.com/exploits/145

Exploit ID: 154

Source: exploitdb

URL: https://www.exploit-db.com/exploits/154

Exploit ID: 160

Source: exploitdb

URL: https://www.exploit-db.com/exploits/160

Exploit ID: 20004

Source: exploitdb

URL: https://www.exploit-db.com/exploits/20004

Exploit ID: 21124

Source: exploitdb

URL: https://www.exploit-db.com/exploits/21124

Exploit ID: 21141

Source: exploitdb

URL: https://www.exploit-db.com/exploits/21141

Exploit ID: 21242

Source: exploitdb

URL: https://www.exploit-db.com/exploits/21242

Exploit ID: 22105

Source: exploitdb

URL: https://www.exploit-db.com/exploits/22105

Exploit ID: 22131

Source: exploitdb

URL: https://www.exploit-db.com/exploits/22131

Exploit ID: 22362

Source: exploitdb

URL: https://www.exploit-db.com/exploits/22362

Exploit ID: 22363

Source: exploitdb

URL: https://www.exploit-db.com/exploits/22363

Exploit ID: 22640

Source: exploitdb

URL: https://www.exploit-db.com/exploits/22640

Exploit ID: 22813

Source: exploitdb

URL: https://www.exploit-db.com/exploits/22813

Exploit ID: 22840

Source: exploitdb

URL: https://www.exploit-db.com/exploits/22840

Exploit ID: 24043

Source: exploitdb

URL: https://www.exploit-db.com/exploits/24043

Exploit ID: 24078

Source: exploitdb

URL: https://www.exploit-db.com/exploits/24078

Exploit ID: 24777

Source: exploitdb

URL: https://www.exploit-db.com/exploits/24777

Exploit ID: 26076

Source: exploitdb

URL: https://www.exploit-db.com/exploits/26076

Exploit ID: 26248

Source: exploitdb

URL: https://www.exploit-db.com/exploits/26248

Exploit ID: 26353

Source: exploitdb

URL: https://www.exploit-db.com/exploits/26353

Exploit ID: 26382

Source: exploitdb

URL: https://www.exploit-db.com/exploits/26382

Exploit ID: 26489

Source: exploitdb

URL: https://www.exploit-db.com/exploits/26489

Exploit ID: 26648

Source: exploitdb

URL: https://www.exploit-db.com/exploits/26648

Exploit ID: 26749

Source: exploitdb

URL: https://www.exploit-db.com/exploits/26749

Exploit ID: 27031

Source: exploitdb

URL: https://www.exploit-db.com/exploits/27031

Exploit ID: 3

Source: exploitdb

URL: https://www.exploit-db.com/exploits/3

Exploit ID: 306

Source: exploitdb

URL: https://www.exploit-db.com/exploits/306

Exploit ID: 3555

Source: exploitdb

URL: https://www.exploit-db.com/exploits/3555

Exploit ID: 398

Source: exploitdb

URL: https://www.exploit-db.com/exploits/398

Exploit ID: 399

Source: exploitdb

URL: https://www.exploit-db.com/exploits/399

Exploit ID: 624

Source: exploitdb

URL: https://www.exploit-db.com/exploits/624

Exploit ID: 68

Source: exploitdb

URL: https://www.exploit-db.com/exploits/68

Exploit ID: 685

Source: exploitdb

URL: https://www.exploit-db.com/exploits/685

Exploit ID: 690

Source: exploitdb

URL: https://www.exploit-db.com/exploits/690

Exploit ID: 692

Source: exploitdb

URL: https://www.exploit-db.com/exploits/692

Exploit ID: 744

Source: exploitdb

URL: https://www.exploit-db.com/exploits/744

Exploit ID: 778

Source: exploitdb

URL: https://www.exploit-db.com/exploits/778

Exploit ID: 895

Source: exploitdb

URL: https://www.exploit-db.com/exploits/895

Exploit ID: 9363

Source: exploitdb

URL: https://www.exploit-db.com/exploits/9363

Reference Links

Recommendations

Source: bdu

Проблема может быть решена обновлением операционной системы до следующих версий пакетов в зависимости от архитектуры:
Debian GNU/Linux 3.1:
ppc:
mips-tools - 2.4.27-10.sarge1.040815-1
kernel-build-2.4.27-apus - 2.4.27-10sarge1
kernel-build-2.4.27-nubus - 2.4.27-10sarge1
kernel-build-2.4.27-powerpc - 2.4.27-10sarge1
kernel-build-2.4.27-powerpc-small - 2.4.27-10sarge1
kernel-build-2.4.27-powerpc-smp - 2.4.27-10sarge1
kernel-headers-2.4.27-apus - 2.4.27-10sarge1
kernel-headers-2.4.27-nubus - 2.4.27-10sarge1
kernel-headers-2.4.27-powerpc - 2.4.27-10sarge1
kernel-image-2.4.27-apus - 2.4.27-10sarge1
kernel-image-2.4.27-nubus - 2.4.27-10sarge1
kernel-image-2.4.27-powerpc - 2.4.27-10sarge1
kernel-image-2.4.27-powerpc-small - 2.4.27-10sarge1
kernel-image-2.4.27-powerpc-smp - 2.4.27-10sarge1
kernel-patch-2.4.27-apus - 2.4.27-10sarge1
kernel-patch-2.4.27-nubus - 2.4.27-10sarge1
kernel-patch-2.4.27-powerpc - 2.4.27-10sarge1
s390x:
mips-tools - 2.4.27-10.sarge1.040815-1
kernel-headers-2.4.27-2 - 2.4.27-2sarge1
kernel-image-2.4.27-2-s390 - 2.4.27-2sarge1
kernel-image-2.4.27-2-s390-tape - 2.4.27-2sarge1
kernel-image-2.4.27-2-s390x - 2.4.27-2sarge1
m68k:
kernel-image-2.4.27-amiga - 2.4.27-3sarge1
kernel-image-2.4.27-atari - 2.4.27-3sarge1
kernel-image-2.4.27-bvme6000 - 2.4.27-3sarge1
kernel-image-2.4.27-mac - 2.4.27-3sarge1
kernel-image-2.4.27-mvme147 - 2.4.27-3sarge1
kernel-image-2.4.27-mvme16x - 2.4.27-3sarge1
kernel-image-2.4.27-q40 - 2.4.27-3sarge1
mips-tools - 2.4.27-10.sarge1.040815-1
i686:
kernel-build-2.4.27-2 - 2.4.27-10sarge1
kernel-headers-2.4.27-2 - 2.4.27-10sarge1
kernel-headers-2.4.27-2-386 - 2.4.27-10sarge1
kernel-headers-2.4.27-2-586tsc - 2.4.27-10sarge1
kernel-headers-2.4.27-2-686 - 2.4.27-10sarge1
kernel-headers-2.4.27-2-686-smp - 2.4.27-10sarge1
kernel-headers-2.4.27-2-k6 - 2.4.27-10sarge1
kernel-headers-2.4.27-2-k7 - 2.4.27-10sarge1
kernel-headers-2.4.27-2-k7-smp - 2.4.27-10sarge1
kernel-image-2.4.27-2-386 - 2.4.27-10sarge1
kernel-image-2.4.27-2-586tsc - 2.4.27-10sarge1
kernel-image-2.4.27-2-686 - 2.4.27-10sarge1
kernel-image-2.4.27-2-686-smp - 2.4.27-10sarge1
kernel-image-2.4.27-2-k6 - 2.4.27-10sarge1
kernel-image-2.4.27-2-k7 - 2.4.27-10sarge1
kernel-image-2.4.27-2-k7-smp - 2.4.27-10sarge1
kernel-pcmcia-modules-2.4.27-2-386 - 2.4.27-10sarge1
kernel-pcmcia-modules-2.4.27-2-586tsc - 2.4.27-10sarge1
kernel-pcmcia-modules-2.4.27-2-686 - 2.4.27-10sarge1
kernel-pcmcia-modules-2.4.27-2-686-smp - 2.4.27-10sarge1
kernel-pcmcia-modules-2.4.27-2-k6 - 2.4.27-10sarge1
kernel-pcmcia-modules-2.4.27-2-k7 - 2.4.27-10sarge1
kernel-pcmcia-modules-2.4.27-2-k7-smp - 2.4.27-10sarge1
mips-tools - 2.4.27-10.sarge1.040815-1
arm:
kernel-build-2.4.27 - 2.4.27-2sarge1
kernel-headers-2.4.27 - 2.4.27-2sarge1
kernel-image-2.4.27-bast - 2.4.27-2sarge1
kernel-image-2.4.27-lart - 2.4.27-2sarge1
kernel-image-2.4.27-netwinder - 2.4.27-2sarge1
kernel-image-2.4.27-riscpc - 2.4.27-2sarge1
kernel-image-2.4.27-riscstation - 2.4.27-2sarge1
mips-tools - 2.4.27-10.sarge1.040815-1
sparc:
mips-tools - 2.4.27-10.sarge1.040815-1
kernel-build-2.4.27-2 - 2.4.27-9sarge1
kernel-headers-2.4.27-2 - 2.4.27-9sarge1
kernel-headers-2.4.27-2-sparc32 - 2.4.27-9sarge1
kernel-headers-2.4.27-2-sparc32-smp - 2.4.27-9sarge1
kernel-headers-2.4.27-2-sparc64 - 2.4.27-9sarge1
kernel-headers-2.4.27-2-sparc64-smp - 2.4.27-9sarge1
kernel-image-2.4.27-2-sparc32 - 2.4.27-9sarge1
kernel-image-2.4.27-2-sparc32-smp - 2.4.27-9sarge1
kernel-image-2.4.27-2-sparc64 - 2.4.27-9sarge1
kernel-image-2.4.27-2-sparc64-smp - 2.4.27-9sarge1
x86-64:
mips-tools - 2.4.27-10.sarge1.040815-1
alpha:
kernel-build-2.4.27-2 - 2.4.27-10sarge1
kernel-headers-2.4.27-2 - 2.4.27-10sarge1
kernel-headers-2.4.27-2-generic - 2.4.27-10sarge1
kernel-headers-2.4.27-2-smp - 2.4.27-10sarge1
kernel-image-2.4.27-2-generic - 2.4.27-10sarge1
kernel-image-2.4.27-2-smp - 2.4.27-10sarge1
mips-tools - 2.4.27-10.sarge1.040815-1
ia64:
kernel-build-2.4.27-2 - 2.4.27-10sarge1
kernel-headers-2.4.27-2 - 2.4.27-10sarge1
kernel-headers-2.4.27-2-itanium - 2.4.27-10sarge1
kernel-headers-2.4.27-2-itanium-smp - 2.4.27-10sarge1
kernel-headers-2.4.27-2-mckinley - 2.4.27-10sarge1
kernel-headers-2.4.27-2-mckinley-smp - 2.4.27-10sarge1
kernel-image-2.4-itanium - 2.4.27-10sarge1
kernel-image-2.4-itanium-smp - 2.4.27-10sarge1
kernel-image-2.4-mckinley - 2.4.27-10sarge1
kernel-image-2.4-mckinley-smp - 2.4.27-10sarge1
kernel-image-2.4.27-2-itanium - 2.4.27-10sarge1
kernel-image-2.4.27-2-itanium-smp - 2.4.27-10sarge1
kernel-image-2.4.27-2-mckinley - 2.4.27-10sarge1
kernel-image-2.4.27-2-mckinley-smp - 2.4.27-10sarge1
mips-tools - 2.4.27-10.sarge1.040815-1
mips:
kernel-headers-2.4.27 - 2.4.27-10.sarge1.040815-1
kernel-image-2.4.27-r4k-ip22 - 2.4.27-10.sarge1.040815-1
kernel-image-2.4.27-r5k-ip22 - 2.4.27-10.sarge1.040815-1
kernel-image-2.4.27-sb1-swarm-bn - 2.4.27-10.sarge1.040815-1
mips-tools - 2.4.27-10.sarge1.040815-1
noarch:
kernel-doc-2.4.27 - 2.4.27-10sarge1
kernel-patch-debian-2.4.27 - 2.4.27-10sarge1
kernel-source-2.4.27 - 2.4.27-10sarge1
kernel-tree-2.4.27 - 2.4.27-10sarge1
kernel-patch-2.4.27-arm - 2.4.27-1sarge1
mipsel:
kernel-headers-2.4.27 - 2.4.27-10.sarge1.040815-1
kernel-image-2.4.27-r3k-kn02 - 2.4.27-10.sarge1.040815-1
kernel-image-2.4.27-r4k-kn04 - 2.4.27-10.sarge1.040815-1
kernel-image-2.4.27-r5k-cobalt - 2.4.27-10.sarge1.040815-1
kernel-image-2.4.27-r5k-lasat - 2.4.27-10.sarge1.040815-1
kernel-image-2.4.27-sb1-swarm-bn - 2.4.27-10.sarge1.040815-1
kernel-image-2.4.27-xxs1500 - 2.4.27-10.sarge1.040815-1
mips-tools - 2.4.27-10.sarge1.040815-1
hppa:
mips-tools - 2.4.27-10.sarge1.040815

URL: https://bdu.fstec.ru/vul/2015-02783

Vulnerable Software (1)

Type: Configuration

Vendor: сообщество свободного программного обеспечения

Product: debian gnu/linux

Operating System: * *

Trait:
{  "version_end_excluding": "3.1"}

Source: bdu

End of list