SB2007110901 - Memory corruption in Linux kernel
Published: November 9, 2007
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Memory corruption (CVE-ID: CVE-2007-5904)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.
Remediation
Install update from vendor's website.
References
- http://git.kernel.org/?p=linux/kernel/git/sfrench/cifs-2.6.git;a=commitdiff;h=133672efbc1085f9af990bdc145e1822ea93bcf3
- http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
- http://marc.info/?l=linux-kernel&m=119455843205403&w=2
- http://marc.info/?l=linux-kernel&m=119457447724276&w=2
- http://secunia.com/advisories/27666
- http://secunia.com/advisories/27888
- http://secunia.com/advisories/27912
- http://secunia.com/advisories/28643
- http://secunia.com/advisories/28826
- http://secunia.com/advisories/29245
- http://secunia.com/advisories/29387
- http://secunia.com/advisories/29570
- http://secunia.com/advisories/30769
- http://secunia.com/advisories/30818
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0048
- http://www.debian.org/security/2007/dsa-1428
- http://www.novell.com/linux/security/advisories/2007_63_kernel.html
- http://www.redhat.com/support/errata/RHSA-2008-0089.html
- http://www.redhat.com/support/errata/RHSA-2008-0167.html
- http://www.securityfocus.com/archive/1/487808/100/0/threaded
- http://www.securityfocus.com/bid/26438
- http://www.securitytracker.com/id?1019612
- http://www.ubuntu.com/usn/usn-618-1
- http://www.vupen.com/english/advisories/2007/3860
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38450
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9901