Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Linux Kernel e1000 Ethernet Card Driver Buffer Overflow Vulnerability
SecurityFocus.com ^ | May 14, 2004 | SecurityFocus.com

Posted on 05/19/2004 8:47:14 PM PDT by Bush2000

Linux Kernel e1000 Ethernet Card Driver Buffer Overflow Vulnerability

Reportedly the Linux kernel e1000 Ethernet card driver is affected by a buffer overflow vulnerability. This issue is due to a failure of the application to validate user input lengths before processing them.

This issue might allow an attacker to corrupt kernel memory space. It might be possible to leverage this issue to execute arbitrary code on the affected system, although this has not been verified.

bugtraq id 10352
object
class Boundary Condition Error
cve CVE-MAP-NOMATCH

remote Unknown
local Yes
published May 14, 2004
updated May 14, 2004
vulnerable
Linux kernel 2.4 .0-test9
Linux kernel 2.4 .0-test8
Linux kernel 2.4 .0-test7
Linux kernel 2.4 .0-test6
Linux kernel 2.4 .0-test5
Linux kernel 2.4 .0-test4
Linux kernel 2.4 .0-test3
Linux kernel 2.4 .0-test2
Linux kernel 2.4 .0-test12
Linux kernel 2.4 .0-test11
Linux kernel 2.4 .0-test10
Linux kernel 2.4 .0-test1
Linux kernel 2.4
Linux kernel 2.4.1
Linux kernel 2.4.2
+ Caldera OpenLinux Server 3.1
+ Caldera OpenLinux Workstation 3.1
+ RedHat Linux 7.1 alpha
+ RedHat Linux 7.1 i386
Linux kernel 2.4.3
+ MandrakeSoft Linux Mandrake 8.0
+ MandrakeSoft Linux Mandrake 8.0 ppc
Linux kernel 2.4.4
+ S.u.S.E. Linux 7.2
Linux kernel 2.4.5
+ Slackware Linux 8.0
Linux kernel 2.4.6
Linux kernel 2.4.7
+ RedHat Linux 7.2
+ S.u.S.E. Linux 7.1
+ S.u.S.E. Linux 7.2
Linux kernel 2.4.8
+ MandrakeSoft Linux Mandrake 8.0
+ MandrakeSoft Linux Mandrake 8.1
+ MandrakeSoft Linux Mandrake 8.2
Linux kernel 2.4.9
+ RedHat Enterprise Linux AS 2.1
+ RedHat Enterprise Linux AS 2.1 IA64
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux ES 2.1 IA64
+ RedHat Enterprise Linux WS 2.1
+ RedHat Enterprise Linux WS 2.1 IA64
+ RedHat Linux 7.1 alpha
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 ia64
+ RedHat Linux 7.2 alpha
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2 ia64
+ Sun Linux 5.0
+ Sun Linux 5.0.3
+ Sun Linux 5.0.5
Linux kernel 2.4.10
+ S.u.S.E. Linux 7.3
Linux kernel 2.4.11
Linux kernel 2.4.12
+ Conectiva Linux 7.0
Linux kernel 2.4.13
+ Caldera OpenLinux Server 3.1.1
+ Caldera OpenLinux Workstation 3.1.1
Linux kernel 2.4.14
Linux kernel 2.4.15
Linux kernel 2.4.16
+ Sun Cobalt RaQ 550
Linux kernel 2.4.17
Linux kernel 2.4.18 pre-8
Linux kernel 2.4.18 pre-7
Linux kernel 2.4.18 pre-6
Linux kernel 2.4.18 pre-5
Linux kernel 2.4.18 pre-4
Linux kernel 2.4.18 pre-3
Linux kernel 2.4.18 pre-2
Linux kernel 2.4.18 pre-1
Linux kernel 2.4.18 x86
+ Debian Linux 3.0 ia-32
Linux kernel 2.4.18
+ Astaro Security Linux 2.0 16
+ Astaro Security Linux 2.0 23
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 sparc
+ MandrakeSoft Linux Mandrake 8.0
+ MandrakeSoft Linux Mandrake 8.1
+ MandrakeSoft Linux Mandrake 8.2
+ RedHat Advanced Workstation for the Itanium Processor 2.1 IA64
+ RedHat Enterprise Linux AS 2.1 IA64
+ RedHat Linux 7.3
+ RedHat Linux 8.0
+ S.u.S.E. Linux 7.1
+ S.u.S.E. Linux 7.2
+ S.u.S.E. Linux 7.3
+ S.u.S.E. Linux 8.0
+ S.u.S.E. Linux 8.1
+ S.u.S.E. Linux 8.2
+ S.u.S.E. Linux Connectivity Server
+ S.u.S.E. Linux Database Server
+ S.u.S.E. Linux Enterprise Server 7
+ S.u.S.E. Linux Enterprise Server 8
+ S.u.S.E. Linux Firewall on CD
+ S.u.S.E. Linux Office Server
+ S.u.S.E. Linux Openexchange Server
+ S.u.S.E. SuSE eMail Server 3.1
+ S.u.S.E. SuSE eMail Server III
+ Turbolinux Turbolinux Server 7.0
+ Turbolinux Turbolinux Server 8.0
+ Turbolinux Turbolinux Workstation 7.0
+ Turbolinux Turbolinux Workstation 8.0
Linux kernel 2.4.19 -pre6
Linux kernel 2.4.19 -pre5
Linux kernel 2.4.19 -pre4
Linux kernel 2.4.19 -pre3
Linux kernel 2.4.19 -pre2
Linux kernel 2.4.19 -pre1
Linux kernel 2.4.19
+ Conectiva Linux 8.0
+ Conectiva Linux Enterprise Edition 1.0
+ MandrakeSoft Corporate Server 2.1
+ MandrakeSoft Corporate Server 2.1 x86_64
+ MandrakeSoft Linux Mandrake 9.0
+ MandrakeSoft Multi Network Firewall 8.2
+ S.u.S.E. Linux 8.1
+ Slackware Linux -current
Linux kernel 2.4.20
+ CRUX CRUX Linux 1.0
+ Gentoo Linux 1.2
+ RedHat Linux 9.0 i386
+ Slackware Linux 9.0
+ WOLK WOLK 4.4 s
Linux kernel 2.4.21 pre7
Linux kernel 2.4.21 pre4
+ MandrakeSoft Linux Mandrake 9.1
+ MandrakeSoft Linux Mandrake 9.1 ppc
Linux kernel 2.4.21 pre1
Linux kernel 2.4.21
+ Conectiva Linux 9.0
+ MandrakeSoft Linux Mandrake 9.1
+ MandrakeSoft Linux Mandrake 9.1 ppc
+ S.u.S.E. Linux 9.0
+ S.u.S.E. Linux 9.0 x86_64
+ S.u.S.E. Linux Enterprise Server 8
Linux kernel 2.4.22
+ Devil-Linux Devil-Linux 1.0.4
+ Devil-Linux Devil-Linux 1.0.5
+ MandrakeSoft Linux Mandrake 9.2
+ MandrakeSoft Linux Mandrake 9.2 amd64
+ RedHat Fedora Core1
+ Slackware Linux 9.1
Linux kernel 2.4.23 -pre9
Linux kernel 2.4.23 -ow2
Linux kernel 2.4.23
+ Trustix Secure Linux 2.0
Linux kernel 2.4.24 -ow1
Linux kernel 2.4.24
Linux kernel 2.4.25
Linux kernel 2.4.26
Linux kernel 2.4.27 -pre1

not vulnerable Linux kernel 2.4.27 -pre2


TOPICS: Computers/Internet
KEYWORDS:
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-68 last
To: N3WBI3; Golden Eagle

MOre importantly not one reboot..


61 posted on 05/21/2004 6:52:04 AM PDT by N3WBI3
[ Post Reply | Private Reply | To 60 | View Replies]

To: inflation
Facts suck sometimes. Do you get this worked up about Microsoft security holes?

Of course he doesn't because there are none. Nope, I didn't just install XP, only to need to turn off several services and delete several included apps I didn't want (some of them known security or spam problems), nor did I, after installing SP1, have to install an additional 18 critical security patches (including SP1 we're talking over 160 MB of patches). Nope, the after-installation work to get the box relatively secure didn't take most of a morning.

62 posted on 05/24/2004 9:30:19 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 21 | View Replies]

To: Bush2000
Well, since CVS can be hacked, it wouldn't be wise to depend on any of its CRCs...

So you're saying that since CVS has security flaws, then the entire Linux kernel is under suspicion?

63 posted on 05/24/2004 9:35:46 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 38 | View Replies]

To: Golden Eagle
A freaking driver bug causes a kernel meltdown? Must be a benefit of that space age monolithic design, LOL

If you remember from the other thread, this is what Tanenbaum was warning against. Take the performance hit, but get the security and stability bonus.

Of course, a lot of people freaked with Microsoft moved the NT video drivers down to kernel level, making it pretty much totally monolithic too.

64 posted on 05/24/2004 9:39:47 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 48 | View Replies]

To: Bush2000

Come on Bush, that's a pretty strong claim that I think you made, and I'd like to know if Linux's integrity is compromised by this CVS flaw. I don't know much about that CVS exploit, but could someone insert a backdoor into the definitive Linux kernel if they compromised CVS? That would definitely be a bad thing if that is indeed your claim.


65 posted on 05/25/2004 12:04:49 PM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 38 | View Replies]

To: antiRepublicrat
Come on Bush, that's a pretty strong claim that I think you made, and I'd like to know if Linux's integrity is compromised by this CVS flaw. I don't know much about that CVS exploit, but could someone insert a backdoor into the definitive Linux kernel if they compromised CVS? That would definitely be a bad thing if that is indeed your claim.

I don't know if it's happened. I hope not. I don't condone hacking.
66 posted on 05/25/2004 5:34:25 PM PDT by Bush2000
[ Post Reply | Private Reply | To 65 | View Replies]

To: Bush2000
I don't know if it's happened. I hope not. I don't condone hacking.

Good, but you seemed to imply that holes in CVS could compromise the kernel. Is that true?

67 posted on 05/25/2004 6:58:08 PM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 66 | View Replies]

To: zencat
Jeez, this thread is more contentious than Arnold vs. McClintock.

Near as I can tell, it was supposed to be.

68 posted on 05/25/2004 7:16:40 PM PDT by tacticalogic (I Controlled application of force is the sincerest form of communication.)
[ Post Reply | Private Reply | To 28 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-68 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson