[SA13627] Linux Kernel 32bit System Call Emulation and ELF Binary Vulnerabilities

Type securityvulns
Reporter Securityvulns
Modified 2004-12-25T00:00:00


TITLE: Linux Kernel 32bit System Call Emulation and ELF Binary Vulnerabilities


VERIFY ADVISORY: http://secunia.com/advisories/13627/

CRITICAL: Less critical

IMPACT: Privilege escalation, DoS

WHERE: Local system

OPERATING SYSTEM: Linux Kernel 2.4.x http://secunia.com/product/763/

DESCRIPTION: Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges.

1) A boundary error exists in the system call handling in the 32bit system call emulation on AMD64 / Intel EM64T systems.

2) An unspecified error within the memory management handling of ELF executables in "load_elf_binary" can be exploited to crash the system via a specially crafted ELF binary.

Issue 2 only affects Kernel versions prior to 2.4.26.

SOLUTION: Issue 2 has been fixed in Kernel version 2.4.26 and later.

Secunia is currently not aware of an official updated version which fixes issue 1. However, updated packages have been issued by some Linux vendors.

Do not grant access to untrusted users.

PROVIDED AND/OR DISCOVERED BY: 1) Petr Vandrovec 2) Kirill Korotaev

ORIGINAL ADVISORY: http://rhn.redhat.com/errata/RHSA-2004-689.html

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.