Activity Stream
48,167 MEMBERS
6873 ONLINE
besthostingforums On YouTube Subscribe to our Newsletter besthostingforums On Twitter besthostingforums On Facebook besthostingforums On facebook groups

Results 1 to 2 of 2
  1.     
    #1
    Member
    Website's:
    RobustVPS.net

    Default Centos 6 / Rhel 6 == Security hole -- Privledge esclation (CVE-2012-0056)

    Thought this could be handy to make people aware..



    https://rhn.redhat.com/errata/RHSA-2012-0052.html

    * It was found that permissions were not checked properly in the Linux
    kernel when handling the /proc/[pid]/mem writing functionality. A local,
    unprivileged user could use this flaw to escalate their privileges. Refer
    to Red Hat Knowledgebase article DOC-69129, linked to in the References,
    for further information. (CVE-2012-0056, Important)
    https://www.redhat.com/security/data...2012-0056.html


    This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 4 and 5 as it did not backport the upstream commit 198214a7ee. A future kernel update for Red Hat Enterprise MRG may address this issue. This has been addressed in Red Hat Enterprise Linux 6 via https://rhn.redhat.com/errata/RHSA-2012-0052.html.
    How to test if vuln

    Ref: https://access.redhat.com/kb/docs/DOC-69129


    wget "https://bugzilla.redhat.com/attachment.cgi?id=556461" -O test.c
    gcc test.c -o test
    ./test
    Ksplice has an update out

    Synopsis: RHSA-2012:0052-1 can now be patched using Ksplice
    CVEs: CVE-2012-0056
    Red Hat Security Advisory Severity: Important

    Systems running Red Hat Enterprise Linux 6, CentOS 6, and Scientific
    Linux 6 can now use Ksplice to patch against the latest Red Hat
    Security Advisory, RHSA-2012:0052-1.

    INSTALLING THE UPDATES

    We recommend that all users of Ksplice Uptrack on RHEL 6, CentOS 6,
    and Scientific Linux 6 install these updates. You can install these
    updates by running:

    # /usr/sbin/uptrack-upgrade -y
    On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
    these updates will be installed automatically and you do not need to
    take any additional action.


    DESCRIPTION

    * CVE-2012-0056: Privilege escalation in /proc/[pid]/mem writing.

    It was found that permissions were not checked properly in the Linux
    kernel when handling the /proc/[pid]/mem writing functionality. A
    local, unprivileged user could use this flaw to escalate their
    privileges. Refer to Red Hat Knowledgebase article DOC-69129 for
    further information. (CVE-2012-0056, Important)

    SUPPORT

    Ksplice support is available at ksplice-support_ww@oracle.com.
    RobustVPS Reviewed by RobustVPS on . Centos 6 / Rhel 6 == Security hole -- Privledge esclation (CVE-2012-0056) Thought this could be handy to make people aware.. https://rhn.redhat.com/errata/RHSA-2012-0052.html * It was found that permissions were not checked properly in the Linux kernel when handling the /proc//mem writing functionality. A local, unprivileged user could use this flaw to escalate their privileges. Refer to Red Hat Knowledgebase article DOC-69129, linked to in the References, Rating: 5
    RobustVPS - RAID-10 & 1Gbps Unmetered VPS From ?2.95
    KWWHunction Thread | Visit Robust VPS

    ~ Follow RobustVPS On Twitter!
    Previously known as Dan-123Dedi

  2.   Sponsored Links

  3.     
    #2
    Banned
    Website's:
    xsl.tel xsltel.com
    thanks for the heads up

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Apache 2.2.x security tricks (CentOS)
    By NewEraCracker in forum Technical and Security Tutorials
    Replies: 14
    Last Post: 29th Jun 2012, 08:01 AM
  2. XP Security 2012 Virus
    By makfun in forum Technical Help Desk Support
    Replies: 15
    Last Post: 22nd Jun 2011, 08:13 PM
  3. Ban this ass hole![/b/way]
    By NucleA in forum General Discussion
    Replies: 8
    Last Post: 1st Feb 2010, 04:08 PM
  4. Ban this ass hole!
    By rko in forum General Discussion
    Replies: 54
    Last Post: 1st Feb 2010, 09:56 AM

Tags for this Thread

BE SOCIAL