|
Test Kennung: | 1.3.6.1.4.1.25623.1.0.61711 |
Kategorie: | Debian Local Security Checks |
Titel: | Debian Security Advisory DSA 1643-1 (feta) |
Zusammenfassung: | Debian Security Advisory DSA 1643-1 (feta) |
Beschreibung: | Description: The remote host is missing an update to feta announced via advisory DSA 1643-1. Dmitry E. Oboukhov discovered that the to-upgrade plugin of Feta, a simpler interface to APT, dpkg, and other Debian package tools creates temporary files insecurely, which may lead to local denial of service through symlink attacks. For the stable distribution (etch), this problem has been fixed in version 1.4.15+etch1. For the unstable distribution (sid), this problem has been fixed in version 1.4.16+nmu1. We recommend that you upgrade your feta package. Solution: http://www.securityspace.com/smysecure/catid.html?in=DSA%201643-1 CVSS Score: 7.2 CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2008-4440 http://www.openwall.com/lists/oss-security/2008/10/30/2 Debian Security Information: DSA-1643 (Google Search) http://www.debian.org/security/2008/dsa-1643 BugTraq ID: 30899 http://www.securityfocus.com/bid/30899 http://secunia.com/advisories/32155 |
Copyright | Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com |
Dies ist nur einer von 58962 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |
|