CERT-In Advisory
CIAD-2006-0047
Multiple Vulnerabilities in Linux
Original Issue Date: December 19, 2006
Severity Rating: High
Systems Affected
- GnuPG versions prior to 1.4.6
- GnuPG versions prior to 2.0.2
- Linux Kernel version 2.4.34-rc1 and prior
Overview
Multiple vulnerabilities have been reported in Linux which could be exploited by remote attackers to compromise a vulnerable system to cause denial of service attack and buffer overflow attacks.
Description
1. GnuPG OpenPGP Message Decryption Vulnerability
(
CVE-2006-6235
)
A vulnerability has been reported in GnuPG due to an error while decrypting OpenPGP messages. A remote attacker could create a specially crafted message which when decrypted could execute arbitrary command on the affected system or cause denial of service attack.
2. Linux Kernel Bluetooth CAPI Messages Denial of Service Vulnerability
(
CVE-2006-6106
)
A buffer overflow vulnerability has been reported in Linux Kernel due to errors in the "cmtp_recv_interopmsg " [net/bluetooth/cmtp/capi.c] function while handling malformed CAPI packets. This could be exploited by remote attackers to overwrite internal CMTP and CAPI data structures and execute arbitrary commands with elevated privileges cause denial of service attack.
Solution
Upgrade to GnuPG version 1.4.6 and Linux Kernel 2.4.33.5 or 2.4.34-rc2
Vendor Information
GnuPG
http://www.gnupg.org/
Kernel
http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.5
http://www.kernel.org/pub/linux/kernel/v2.4/testing/patch-2.4.34.log
References
RedHat
http://rhn.redhat.com/errata/RHSA-2006-0754.html
FrSIRT
http://www.frsirt.com/english/advisories/2006/4881
http://www.frsirt.com/english/advisories/2006/5037
Secunia
http://secunia.com/advisories/23245 20
http://secunia.com/advisories/23408/
Security Focus
http://www.securityfocus.com/archive/1/453664
Security Tracker
http://securitytracker.com/alerts/2006/Dec/1017349.html
CVE Name
CVE-2006-6235
CVE-2006-6106
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|