Linux kernel 2.4.x ixj telephony card driver buffer overflow

linux-ixj-bo (15045) The risk level is classified as LowLow Risk

Description:

Linux kernel is vulnerable to a buffer overflow, caused by a vulnerability in the ixj telephony card driver.

Note: It is unknown whether this vulnerability could be exploited by an attacker to execute arbitrary code on the system.


Consequences:

Other

Remedy:

Upgrade to the latest Linux kernel (2.4.21 or later), available from the Linux kernel Web site. See References.

For Red Hat Linux:
Upgrade to the latest kernel package, as listed below. Refer to RHSA-2004:044-06 for more information. See References.

Red Hat Enterprise Linux AS (v. 2.1), ES (v. 2.1), and WS (v. 2.1): 2.4.9-e.37 or later

For Red Hat Linux:
Upgrade to the latest kernel package, as listed below. Refer to RHSA-2004:106-10 for more information. See References.

Red Hat Enterprise Linux AS (v. 2.1) and Advanced Workstation 2.1 for the Itanium Processor: 2.4.18-e.43 or later

For other distributions:
Contact your vendor for upgrade or patch information.

References:

Platforms Affected:

  • Linux Kernel 2.4.1
  • Linux Kernel 2.4.10
  • Linux Kernel 2.4.11
  • Linux Kernel 2.4.12
  • Linux Kernel 2.4.13
  • Linux Kernel 2.4.14
  • Linux Kernel 2.4.15
  • Linux Kernel 2.4.16
  • Linux Kernel 2.4.17
  • Linux Kernel 2.4.18 pre1
  • Linux Kernel 2.4.18 pre2
  • Linux Kernel 2.4.18
  • Linux Kernel 2.4.18 pre3
  • Linux Kernel 2.4.18 pre4
  • Linux Kernel 2.4.18 pre5
  • Linux Kernel 2.4.18 pre6
  • Linux Kernel 2.4.18 pre7
  • Linux Kernel 2.4.18 pre8
  • Linux Kernel 2.4.2
  • Linux Kernel 2.4.3
  • Linux Kernel 2.4.4
  • Linux Kernel 2.4.5
  • Linux Kernel 2.4.6
  • Linux Kernel 2.4.7
  • Linux Kernel 2.4.8
  • Linux Kernel 2.4.9
  • RedHat Enterprise Linux 2.1 AS
  • RedHat Enterprise Linux 2.1 ES
  • RedHat Enterprise Linux 2.1 WS
  • RedHat Enterprise Linux 2.1 AW
  • RedHat Linux 7.1
  • RedHat Linux 7.2
  • RedHat Linux 7.3
  • RedHat Linux 8.0
  • RedHat Linux Advanced Workstation 2.1 Itanium

Reported:

Feb 04, 2004

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page