![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.51065 |
Category: | Red Hat Local Security Checks |
Title: | RedHat Security Advisory RHSA-2004:489 |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing updates announced in advisory RHSA-2004:489. PostgreSQL is an advanced Object-Relational database management system (DBMS) that supports almost all SQL constructs (including transactions, subselects, and user-defined types and functions). Trustix has identified improper temporary file usage in the make_oidjoins_check script. It is possible that an attacker could overwrite arbitrary file contents as the user running the make_oidjoins_check script. This script has been removed from the RPM file since it has no use to ordinary users. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0977 to this issue. Additionally, the following non-security issues have been addressed: - - Fixed a low probability risk for loss of recently committed transactions. - - Fixed a low probability risk for loss of older data due to failure to update transaction status. - - A lock file problem that sometimes prevented automatic restart after a system crash has been fixed. All users of rh-postgresql should upgrade to these updated packages, which resolve these issues. Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date http://rhn.redhat.com/errata/RHSA-2004-489.html Risk factor : Medium CVSS Score: 2.1 |
Cross-Ref: |
BugTraq ID: 11295 Common Vulnerability Exposure (CVE) ID: CVE-2004-0977 http://www.securityfocus.com/bid/11295 Debian Security Information: DSA-577 (Google Search) http://www.debian.org/security/2004/dsa-577 http://security.gentoo.org/glsa/glsa-200410-16.xml http://www.mandriva.com/security/advisories?name=MDKSA-2004:149 http://marc.info/?l=bugtraq&m=109910073808903&w=2 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11360 http://www.redhat.com/support/errata/RHSA-2004-489.html http://www.trustix.org/errata/2004/0050 https://www.ubuntu.com/usn/usn-6-1/ XForce ISS Database: script-temporary-file-overwrite(17583) https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |