Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.63479
Kategorie:Mandrake Local Security Checks
Titel:Mandrake Security Advisory MDVSA-2009:062 (shadow-utils)
Zusammenfassung:The remote host is missing an update to shadow-utils;announced via advisory MDVSA-2009:062.
Beschreibung:Summary:
The remote host is missing an update to shadow-utils
announced via advisory MDVSA-2009:062.

Vulnerability Insight:
A security vulnerability has been identified and fixed in login
application from shadow-utils, which could allow local users in
the utmp group to overwrite arbitrary files via a symlink attack on
a temporary file referenced in a line (aka ut_line) field in a utmp
entry (CVE-2008-5394).

The updated packages have been patched to prevent this.

Note: Mandriva Linux is using login application from util-linux-ng
by default, and therefore is not affected by this issue on default
configuration.

Affected: 2008.0, 2008.1, 2009.0, Corporate 3.0, Corporate 4.0,
Multi Network Firewall 2.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2008-5394
BugTraq ID: 32552
http://www.securityfocus.com/bid/32552
Bugtraq: 20081130 /bin/login gives root to group utmp (Google Search)
http://www.securityfocus.com/archive/1/498769/100/0/threaded
https://www.exploit-db.com/exploits/7313
http://security.gentoo.org/glsa/glsa-200903-24.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:062
http://osvdb.org/52200
http://securityreason.com/securityalert/4695
http://www.ubuntu.com/usn/usn-695-1
XForce ISS Database: debian-login-symlink(47037)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47037
CopyrightCopyright (C) 2009 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.