Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.50875
Categoría:Mandrake Local Security Checks
Título:Mandrake Security Advisory MDKSA-2001:055-1 (xinetd)
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing an update to xinetd
announced via advisory MDKSA-2001:055-1.

A bug exists in xinetd as shipped with Mandrake Linux 8.0 dealing with
TCP connections with the WAIT state that prevents linuxconf-web from
working properly. As well, xinetd contains a security flaw in which
it defaults to a umask of 0. This means that applications using the
xinetd umask that do not set permissions themselves (like SWAT, a web
configuration tool for Samba), will create world writable files. This
update sets the default umask to 022.

Update:

This update forces the TMPDIR to /tmp instead of obtaining it from the
root user by default, which uses /root/tmp. As well, this version of
xinetd also fixed a possible buffer overflow in the logging code that
was reported by zen-parse on bugtraq, but was not mentioned in the
previous advisory.

Affected versions: 7.2, 8.0, Single Network Firewall 7.2

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2001:055-1
http://www.securityfocus.com/bid/2826
http://www.securityfocus.com/bid/2840
http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS

Risk factor : High

CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.