Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.150322
Categoría:Policy
Título:openGauss: Ensuring the Existence of the Socket File
Resumen:Some application programs may search for the socket file in the /tmp directory to;deceive the server. During the system startup, the socket file /tmp/ $;{USER} _gaussdb/.s.PGSQL. ${PGPORT} is created by default to prevent some;applications from creating or overwriting the socket file in the /tmp directory. In;the file name, ${USER} indicates the installation user name and ${PGPORT};indicates the port number of the node. The path of the socket file is related to the;actual installation path. For details, see the unix_socket_directory parameter in;the ${GAUSSDATA} /postgresql.conf configuration file.
Descripción:Summary:
Some application programs may search for the socket file in the /tmp directory to
deceive the server. During the system startup, the socket file /tmp/ $
{USER} _gaussdb/.s.PGSQL. ${PGPORT} is created by default to prevent some
applications from creating or overwriting the socket file in the /tmp directory. In
the file name, ${USER} indicates the installation user name and ${PGPORT}
indicates the port number of the node. The path of the socket file is related to the
actual installation path. For details, see the unix_socket_directory parameter in
the ${GAUSSDATA} /postgresql.conf configuration file.

CVSS Score:
0.0

CVSS Vector:
AV:L/AC:H/Au:S/C:N/I:N/A:N

CopyrightCopyright (C) 2020 Greenbone Networks GmbH

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.