![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.69239 |
Categoría: | Red Hat Local Security Checks |
Título: | RedHat Security Advisory RHSA-2011:0395 |
Resumen: | NOSUMMARY |
Descripción: | Description: The remote host is missing updates announced in advisory RHSA-2011:0395. The GNOME Display Manager (GDM) provides the graphical login screen, shown shortly after boot up, log out, and when user-switching. A race condition flaw was found in the way GDM handled the cache directories used to store users' dmrc and face icon files. A local attacker could use this flaw to trick GDM into changing the ownership of an arbitrary file via a symbolic link attack, allowing them to escalate their privileges. (CVE-2011-0727) Red Hat would like to thank Sebastian Krahmer of the SuSE Security Team for reporting this issue. All users should upgrade to these updated packages, which contain a backported patch to correct this issue. GDM must be restarted for this update to take effect. Rebooting achieves this, but changing the runlevel from 5 to 3 and back to 5 also restarts GDM. Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date http://rhn.redhat.com/errata/RHSA-2011-0395.html Risk factor : High CVSS Score: 6.9 |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-0727 BugTraq ID: 47063 http://www.securityfocus.com/bid/47063 Debian Security Information: DSA-2205 (Google Search) http://www.debian.org/security/2011/dsa-2205 http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057333.html http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057931.html http://www.mandriva.com/security/advisories?name=MDVSA-2011:070 http://mail.gnome.org/archives/gdm-list/2011-March/msg00020.html http://www.redhat.com/support/errata/RHSA-2011-0395.html http://securitytracker.com/id?1025264 http://secunia.com/advisories/43714 http://secunia.com/advisories/43854 http://secunia.com/advisories/44021 http://www.ubuntu.com/usn/USN-1099-1 http://www.vupen.com/english/advisories/2011/0786 http://www.vupen.com/english/advisories/2011/0787 http://www.vupen.com/english/advisories/2011/0797 http://www.vupen.com/english/advisories/2011/0847 http://www.vupen.com/english/advisories/2011/0911 XForce ISS Database: display-manager-priv-escalation(66377) https://exchange.xforce.ibmcloud.com/vulnerabilities/66377 |
Copyright | Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |