Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.55823
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2005:825
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2005:825.

The lm_sensors package includes a collection of modules for general SMBus
access and hardware monitoring. This package requires special support which
is not in standard version 2.2 kernels.

A bug was found in the way the pwmconfig tool creates temporary files. It
is possible that a local attacker could leverage this flaw to overwrite
arbitrary files located on the system. The Common Vulnerabilities and
Exposures project has assigned the name CVE-2005-2672 to this issue.

Users of lm_sensors are advised to upgrade to these updated packages, which
contain a backported patch that resolves this issue.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2005-825.html

Risk factor : Medium

CVSS Score:
2.1

Referencia Cruzada: BugTraq ID: 14624
Common Vulnerability Exposure (CVE) ID: CVE-2005-2672
http://www.securityfocus.com/bid/14624
Debian Security Information: DSA-814 (Google Search)
http://www.debian.org/security/2005/dsa-814
http://www.mandriva.com/security/advisories?name=MDKSA-2005:149
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9993
http://www.redhat.com/support/errata/RHSA-2005-825.html
http://securitytracker.com/id?1015180
http://secunia.com/advisories/16501
http://secunia.com/advisories/17499
http://secunia.com/advisories/17535
https://usn.ubuntu.com/172-1/
http://www.vupen.com/english/advisories/2005/1492
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.