{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Red Hat Linux 7.3 ;","product":{"name":"N/A","vendor":{"name":"Red Hat","scada":false}}},{"description":"Mandrake Corporate Server 2.1 ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Red Hat Linux 8.0 ;","product":{"name":"N/A","vendor":{"name":"Red Hat","scada":false}}},{"description":"Mandrake Multi Network Firewall 8.2 ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Mandrake 8.2 ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Red Hat Linux 9 ;","product":{"name":"N/A","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Linux 7.2 ;","product":{"name":"N/A","vendor":{"name":"Red Hat","scada":false}}},{"description":"Mandrake 9.0 ;","product":{"name":"N/A","vendor":{"name":"Red Hat","scada":false}}},{"description":"Debian utilisant un noyau de la s\u00e9rie 2.4.","product":{"name":"N/A","vendor":{"name":"Debian","scada":false}}},{"description":"Red Hat Linux 7.1 ;","product":{"name":"N/A","vendor":{"name":"Red Hat","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\n-   Une vuln\u00e9rabilit\u00e9 pr\u00e9sente dans la mise en oeuvre de plusieurs\n    tables de hachage r\u00e9seau du noyau Linux permet \u00e0 un utilisateur mal\n    intentionn\u00e9 d'effectuer un d\u00e9ni de service par l'envoi massif de\n    paquets malicieux ;\n-   L'appel syst\u00e8me `ioperm` permet d'appliquer les permissions sur les\n    ports d'entr\u00e9es/sorties. Une vuln\u00e9rabilit\u00e9 pr\u00e9sente dans celui-ci\n    permet \u00e0 un utilisateur local d'obtenir un acc\u00e8s en lecture et\n    \u00e9criture aux ports d'entr\u00e9es/sorties du syst\u00e8me.\n\n## Solution\n\nAppliquer le correctif suivant la version affect\u00e9e :\n\n-   Bulletin de s\u00e9curit\u00e9 \\#RHSA-2003:172-23 de Red Hat :\n\n        http://rhn.redhat.com/errata/RHSA-2003-172.html\n\n-   Bulletin de s\u00e9curit\u00e9 \\#RHSA-2003:187-25 de Red Hat :\n\n        http://rhn.redhat.com/errata/RHSA-2003-187.html\n\n-   Bulletin de s\u00e9curit\u00e9 \\#RHSA-2003:195-06 de Red Hat :\n\n        http://rhn.redhat.com/errata/RHSA-2003-195.html\n\n-   Bulletin de s\u00e9curit\u00e9 \\#MDKSA-2003:066-01 de Mandrake :\n\n        http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:066-1\n\n-   Bulletin de s\u00e9curit\u00e9 \\#MDKSA-2003:074 de Mandrake :\n\n        http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:074\n\n-   Bulletin de s\u00e9curit\u00e9 \\#DSA 311-1 de Debian :\n\n        http://www.debian.org/security/2003/dsa-311\n\n-   Bulletin de s\u00e9curit\u00e9 \\#DSA 332-1 de Debian :\n\n        http://www.debian.org/security/2003/dsa-332\n","cves":[],"links":[],"reference":"CERTA-2003-AVI-087","revisions":[{"description":"version initiale.","revision_date":"2003-05-16T00:00:00.000000"},{"description":"ajout des bulletins de s\u00e9curit\u00e9 Mandrake, RedHat et Debian.","revision_date":"2003-07-24T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"Plusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans le noyau linux 2.4.\n","title":"Vuln\u00e9rabilit\u00e9s dans le noyau linux 2.4","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 RHSA-2003:172-23 de Red Hat","url":null}]}
