FreeBSD-SA-04:12.jailroute.asc advisory for FreeBSD with jail(2) system cal
Reporter | Title | Published | Views | Family All 8 |
---|---|---|---|---|
![]() | FreeBSD-SA-04:12.jailroute | 7 Jun 200400:00 | – | freebsd_advisory |
![]() | CVE-2004-0125 | 6 Aug 200404:00 | – | cve |
![]() | FreeBSD-SA-04:12.jailroute | 8 Jun 200400:00 | – | securityvulns |
![]() | CVE-2004-0125 | 23 Jun 200404:00 | – | cvelist |
![]() | jailed processes can manipulate host routing tables | 3 Feb 200400:00 | – | freebsd |
![]() | FreeBSD Security Advisory (FreeBSD-SA-04:12.jailroute.asc) | 4 Sep 200800:00 | – | openvas |
![]() | CVE-2004-0125 | 6 Aug 200404:00 | – | nvd |
![]() | FreeBSD : SA-04:12.jailroute | 6 Jul 200400:00 | – | nessus |
Source | Link |
---|---|
securityfocus | www.securityfocus.com/bid/10485 |
secure1 | www.secure1.securityspace.com/smysecure/catid.html |
# SPDX-FileCopyrightText: 2008 E-Soft Inc.
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.52654");
script_version("2023-07-26T05:05:09+0000");
script_tag(name:"last_modification", value:"2023-07-26 05:05:09 +0000 (Wed, 26 Jul 2023)");
script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
script_cve_id("CVE-2004-0125");
script_tag(name:"cvss_base", value:"7.2");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_name("FreeBSD Security Advisory (FreeBSD-SA-04:12.jailroute.asc)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2008 E-Soft Inc.");
script_family("FreeBSD Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/freebsd", "ssh/login/freebsdpatchlevel");
script_tag(name:"insight", value:"The jail(2) system call allows a system administrator to lock up a
process and all its descendants inside a closed environment with very
limited ability to affect the system outside that environment, even
for processes with superuser privileges. It is an extension of, but
far more stringent than, the traditional Unix chroot(2) system call.
The FreeBSD kernel maintains internal routing tables for the purpose
of determining which interface should be used to transmit packets.
These routing tables can be manipulated by user processes running
with superuser privileges by sending messages over a routing socket.
A programming error resulting in a failure to verify that an attempt
to manipulate routing tables originated from a non-jailed process.");
script_tag(name:"solution", value:"Upgrade your system to the appropriate stable release
or security branch dated after the correction date.");
script_xref(name:"URL", value:"https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-04:12.jailroute.asc");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/10485");
script_tag(name:"summary", value:"The remote host is missing an update to the system
as announced in the referenced advisory FreeBSD-SA-04:12.jailroute.asc");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("pkg-lib-bsd.inc");
vuln = FALSE;
if(patchlevelcmp(rel:"4.9", patchlevel:"10")<0) {
vuln = TRUE;
}
if(patchlevelcmp(rel:"4.8", patchlevel:"23")<0) {
vuln = TRUE;
}
if(vuln) {
security_message(port:0);
} else if (__pkg_match) {
exit(99);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo