Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.71569
Kategorie:Gentoo Local Security Checks
Titel:Gentoo Security Advisory GLSA 201207-07 (keepalived)
Zusammenfassung:The remote host is missing updates announced in;advisory GLSA 201207-07.
Beschreibung:Summary:
The remote host is missing updates announced in
advisory GLSA 201207-07.

Vulnerability Insight:
Keepalived uses world-writable PID files, allowing a local attacker
to kill arbitrary processes.

Solution:
All Keepalived users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose
'>=sys-cluster/keepalived-1.2.2-r3'

CVSS Score:
3.6

CVSS Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2011-1784
44460
http://secunia.com/advisories/44460
47859
http://www.securityfocus.com/bid/47859
72380
http://www.osvdb.org/72380
[debian-security] 20110510 Re: World writable pid and lock files.
http://lists.debian.org/debian-security/2011/05/msg00013.html
[debian-security] 20110510 World writable pid and lock files.
http://lists.debian.org/debian-security/2011/05/msg00012.html
[debian-security] 20110511 Re: World writable pid and lock files.
http://lists.debian.org/debian-security/2011/05/msg00018.html
[oss-security] 20110510 CVE request: keepalived pid file permissions issue
http://openwall.com/lists/oss-security/2011/05/10/5
[oss-security] 20110516 Re: CVE request: keepalived pid file permissions issue
http://openwall.com/lists/oss-security/2011/05/16/7
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=626281
https://bugzilla.redhat.com/show_bug.cgi?id=704039
keepalived-pid-dos(67477)
https://exchange.xforce.ibmcloud.com/vulnerabilities/67477
CopyrightCopyright (C) 2012 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.