Summary
The remote host is missing an update to kernel-source-2.6.8 et. al.
announced via advisory DSA 1111-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201111-1
Insight
It was discovered that a race condition in the process filesystem can lead to privilege escalation.
The following matrix explains which kernel version for which architecture fixes the problem mentioned above:
Debian 3.1 (sarge)
Source 2.6.8-16sarge4
Alpha architecture 2.6.8-16sarge4
AMD64 architecture 2.6.8-16sarge4
Intel IA-32 architecture 2.6.8-16sarge4
Intel IA-64 architecture 2.6.8-14sarge4
PowerPC architecture 2.6.8-12sarge4
Sun Sparc architecture 2.6.8-15sarge4
As an exploit for this issue in the wild, this advisory was sent out without builds for the IBM S/390, Motorola 680x0 and HP Precision architectures being available. They will be released in a followup-advisory as soon as they are available. Also, the kernels for the FAI installer haven't been updated yet. As a workaround we recommend to mount proc with the nosuid and noexec options.
We recommend that you upgrade your kernel package immediately and reboot
Severity
Classification
-
CVE CVE-2006-3625 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities