Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.55171
Kategorie:Mandrake Local Security Checks
Titel:Mandrake Security Advisory MDKSA-2005:149 (lm_sensors)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing an update to lm_sensors
announced via advisory MDKSA-2005:149.

Javier Fernandez-Sanguino Pena discovered that the pwmconfig script in
the lm_sensors package created temporary files in an insecure manner.
This could allow a symlink attack to create or overwrite arbitrary
files with full root privileges because pwmconfig is typically executed
by root.

The updated packages have been patched to correct this problem by using
mktemp to create the temporary files.

Affected versions: 10.0, 10.1, 10.2, Corporate 3.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2005:149

Risk factor : Medium

CVSS Score:
2.1

Querverweis: BugTraq ID: 14624
Common Vulnerability Exposure (CVE) ID: CVE-2005-2672
http://www.securityfocus.com/bid/14624
Debian Security Information: DSA-814 (Google Search)
http://www.debian.org/security/2005/dsa-814
http://www.mandriva.com/security/advisories?name=MDKSA-2005:149
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9993
http://www.redhat.com/support/errata/RHSA-2005-825.html
http://securitytracker.com/id?1015180
http://secunia.com/advisories/16501
http://secunia.com/advisories/17499
http://secunia.com/advisories/17535
https://usn.ubuntu.com/172-1/
http://www.vupen.com/english/advisories/2005/1492
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.