int(512)

Boletines de Vulnerabilidades


Vulnerabilidad en paquete iproute

Clasificación de la vulnerabilidad

Propiedad Valor
Nivel de Confianza Oficial
Impacto Denegación de Servicio
Dificultad Experto
Requerimientos del atacante Acceso remoto con cuenta

Información sobre el sistema

Propiedad Valor
Fabricant afectat GNU/Linux
Software afectado iproute <=2.4.7

Descripción

Se ha encontrado una vulnerabilidad que afecta al paquete iproute. Este paquete contiene herramientas de configuración de dispositivos de red y de enrutamiento IP.

Se ha sabido que iproute puede aceptar mensajes falseados (spoofed) enviados a la interfaz netlink del kernel por otros usuarios del sistemal. Este fallo puede aprovecharse para generar una denegación de servicio local

Solución



Actualización de software

Red Hat Linux

Red Hat Linux 7.1:
SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/iproute-2.4.7-7.71.1.src.rpm
ftp://updates.redhat.com/7.1/en/os/SRPMS/iproute-2.4.7-7.71ppc.1.src.rpm
i386:
ftp://updates.redhat.com/7.1/en/os/i386/iproute-2.4.7-7.71.1.i386.rpm

Red Hat Linux 7.1 for iSeries (64 bit):
SRPMS:
ftp://updates.redhat.com/7.1/en/os/iSeries/SRPMS/iproute-2.4.7-7.71ppc.1.src.rpm
ppc:
ftp://updates.redhat.com/7.1/en/os/iSeries/ppc/iproute-2.4.7-7.71ppc.1.ppc.rpm

Red Hat Linux 7.1 for pSeries (64 bit):
SRPMS:
ftp://updates.redhat.com/7.1/en/os/pSeries/SRPMS/iproute-2.4.7-7.71ppc.1.src.rpm
ppc:
ftp://updates.redhat.com/7.1/en/os/pSeries/ppc/iproute-2.4.7-7.71ppc.1.ppc.rpm

Red Hat Linux 7.2:
SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/iproute-2.4.7-7.72.1.src.rpm
i386:
ftp://updates.redhat.com/7.2/en/os/i386/iproute-2.4.7-7.72.1.i386.rpm
ia64:
ftp://updates.redhat.com/7.2/en/os/ia64/iproute-2.4.7-7.72.1.ia64.rpm

Red Hat Linux 7.3:
SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/iproute-2.4.7-7.73.1.src.rpm
i386:
ftp://updates.redhat.com/7.3/en/os/i386/iproute-2.4.7-7.73.1.i386.rpm

Red Hat Linux 8.0:
SRPMS:
ftp://updates.redhat.com/8.0/en/os/SRPMS/iproute-2.4.7-7.80.1.src.rpm
i386:
ftp://updates.redhat.com/8.0/en/os/i386/iproute-2.4.7-7.80.1.i386.rpm

Red Hat Linux 9:
SRPMS:
ftp://updates.redhat.com/9/en/os/SRPMS/iproute-2.4.7-7.90.1.src.rpm
i386:
ftp://updates.redhat.com/9/en/os/i386/iproute-2.4.7-7.90.1.i386.rpm

Debian Linux

Debian Linux 3.0
Source
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1.dsc
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1.diff.gz
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824.orig.tar.gz
Alpha
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_alpha.deb
ARM
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_arm.deb
Intel IA-32
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_i386.deb
Intel IA-64
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_ia64.deb
HP Precision
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_hppa.deb
Motorola 680x0
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_m68k.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_mipsel.deb
PowerPC
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_s390.deb
Sun Sparc
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_sparc.deb

Mandrake Linux
Mandrake Linux 9.2
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/iproute2-2.4.7-11.1.92mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/SRPMS/iproute2-2.4.7-11.1.92mdk.src.rpm
Mandrakelinux 9.2/AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/iproute2-2.4.7-11.1.92mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/SRPMS/iproute2-2.4.7-11.1.92mdk.src.rpm
Mandrake Linux 10.0
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/iproute2-2.4.7-11.1.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/iproute2-2.4.7-11.1.100mdk.src.rpm
Mandrakelinux 10.0/AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/iproute2-2.4.7-11.1.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/iproute2-2.4.7-11.1.100mdk.src.rpm
Multi Network Firewall 8.2
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/RPMS/iproute2-2.2.4-13.1.M82mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/SRPMS/iproute2-2.2.4-13.1.M82mdk.src.rpm
Corporate Server 2.1
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/iproute2-2.4.7-4.2.C21mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/iproute2-2.4.7-4.2.C21mdk.src.rpm
Corporate Server 2.1/X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/iproute2-2.4.7-4.2.C21mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/iproute2-2.4.7-4.2.C21mdk.src.rpm

Identificadores estándar

Propiedad Valor
CVE CAN-2003-0856
BID

Recursos adicionales

RHSA-2003:316-01
http://www.redhat.com/archives/redhat-watch-list/2003-November/msg00011.html

Debian Security Advisory DSA 492-1
http://lists.debian.org/debian-security-announce/debian-security-announce-2004/msg00092.html

Mandrakesoft Security Advisories (MDKSA-2004:148)
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:148

Histórico de versiones

Versión Comentario Data
1.0 Aviso emitido 2003-11-24
1.1 Aviso emitido por Debian 2004-04-19
1.2 Aviso emitido por Mandrake Linux (MDKSA-2004:148) 2004-12-14
Ministerio de Defensa
CNI
CCN
CCN-CERT