![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.51495 |
Kategorie: | Conectiva Local Security Checks |
Titel: | Conectiva Security Advisory CLA-2002:451 |
Zusammenfassung: | NOSUMMARY |
Beschreibung: | Description: The remote host is missing updates announced in advisory CLA-2002:451. sudo is an utility designed to be used by administrators who wish to delegate administrative privileges to regular users for very specific commands, and without giving away the root password. Sebastian Krahmer from SuSe found a vulnerability in the sudo package which could be used by a local attacker to obtain root privileges. Versions prior to and including 1.6.3p7 remove a few potentially dangerous environment variables prior to executing a command as root, but other variables could be abused and used to obtain root privileges. One such scenario is when an unauthorized users attempts to execute sudo. This will cause sudo to execute a mailer to send a notice to the administrator, which is executed as root and with some environment variables specified by the attacker. This has been succesfully exploited with the postfix mailer in a default configuration, but other mailers and programs could be affected too. The author has released version 1.6.4 to address this problem. This version runs the mail program with a clean environment. Solution: The apt tool can be used to perform RPM package upgrades by running 'apt-get update' followed by 'apt-get upgrade' http://www.securityspace.com/smysecure/catid.html?in=CLA-2002:451 http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002002 Risk factor : High |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |