topic title: Linux kernel bug?
worktowork
Posts 0
worktowork
#1
Subject taken from
========= SCRAPER REMOVED AN EMBEDDED LINK HERE ===========
url was:"http://forum.mepiscommunity.org/viewtopic.php?f=73&t=36253&p=340447#p340447"
linktext was:"http://forum.mepiscommunity.org/viewtop ... 47#p340447"
====================================
Last week it was reported that a bug in the Linux kernel could potentially allow users on a Linux-based system to gain privileges and run malicious code. The flaw was introduced during the development of the 2.6.31 kernel and affects kernels up to version 3.14.3. Dan Rosenberg, a security researcher with Azimuth Security opined that a bug like this one, which can affect a wide range of architectures and distributions, is rare."A bug this serious only comes out once every couple years," he said. Distributions have reacted quickly. The Ubuntu developers have released a patch, as has the Debian project. Red Hat has reported they are looking into the issue, but believe the exploit may not affect Red Hat Enterprise Linux.
nmap -sTU -O localhost

Starting Nmap 6.40 (
========= SCRAPER REMOVED AN EMBEDDED LINK HERE ===========
url was:"http://nmap.org"
linktext was:"http://nmap.org"
====================================
) at 2014-05-21 18:46 MSK
Nmap scan report for localhost (127.0.0.1)
Host is up (0.00036s latency).
Other addresses for localhost (not scanned): 127.0.0.1
Not shown: 1989 closed ports
PORT STATE SERVICE
22/tcp open ssh
111/tcp open rpcbind
139/tcp open netbios-ssn
445/tcp open microsoft-ds
631/tcp open ipp
68/udp open|filtered dhcpc
111/udp open rpcbind
123/udp open ntp
137/udp open netbios-ns
138/udp open|filtered netbios-dgm
631/udp open|filtered ipp
No exact OS matches for host (If you know what OS is running on it, see
========= SCRAPER REMOVED AN EMBEDDED LINK HERE ===========
url was:"http://nmap.org/submit/"
linktext was:"http://nmap.org/submit/"
====================================
).
TCP/IP fingerprint:
OS:SCAN(V=6.40%E=4%D=5/21%OT=22%CT=1%CU=2%PV=N%DS=0%DC=L%G=Y%TM=537CBC85%P=
OS:i686-pc-linux-gnu)SEQ(SP=104%GCD=1%ISR=109%TI=Z%CI=I%II=I%TS=8)OPS(O1=MF
OS:FD7ST11NW6%O2=MFFD7ST11NW6%O3=MFFD7NNT11NW6%O4=MFFD7ST11NW6%O5=MFFD7ST11
OS:NW6%O6=MFFD7ST11)WIN(W1=AAAA%W2=AAAA%W3=AAAA%W4=AAAA%W5=AAAA%W6=AAAA)ECN
OS:(R=Y%DF=Y%T=40%W=AAAA%O=MFFD7NNSNW6%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=
OS:AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(
OS:R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%
OS:F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N
OS:%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%C
OS:D=S)

Network Distance: 0 hops

OS detection performed. Please report any incorrect results at
========= SCRAPER REMOVED AN EMBEDDED LINK HERE ===========
url was:"http://nmap.org/submit/"
linktext was:"http://nmap.org/submit/"
====================================
.
Nmap done: 1 IP address (1 host up) scanned in 37.07 seconds
Can you tell me which servers home user must stop to run ? What I must do for protect my PC from hack?