![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.70481 |
Categoría: | Red Hat Local Security Checks |
Título: | RedHat Security Advisory RHSA-2011:1741 |
Resumen: | NOSUMMARY |
Descripción: | Description: The remote host is missing updates announced in advisory RHSA-2011:1741. The php-pear package contains the PHP Extension and Application Repository (PEAR), a framework and distribution system for reusable PHP components. It was found that the pear command created temporary files in an insecure way when installing packages. A malicious, local user could use this flaw to conduct a symbolic link attack, allowing them to overwrite the contents of arbitrary files accessible to the victim running the pear install command. (CVE-2011-1072) This update also fixes the following bugs: * The php-pear package has been upgraded to version 1.9.4, which provides a number of bug fixes over the previous version. (BZ#651897) * Prior to this update, php-pear created a cache in the /var/cache/php-pear/ directory when attempting to list all packages. As a consequence, php-pear failed to create or update the cache file as a regular user without sufficient file permissions and could not list all packages. With this update, php-pear no longer fails if writing to the cache directory is not permitted. Now, all packages are listed as expected. (BZ#747361) All users of php-pear are advised to upgrade to this updated package, which corrects these issues. Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date http://rhn.redhat.com/errata/RHSA-2011-1741.html Risk factor : Low |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-1072 43533 http://secunia.com/advisories/43533 46605 http://www.securityfocus.com/bid/46605 MDVSA-2011:187 http://www.mandriva.com/security/advisories?name=MDVSA-2011:187 RHSA-2011:1741 http://www.redhat.com/support/errata/RHSA-2011-1741.html [oss-security] 20110228 CVE Request: PEAR Installer 1.9.1 <= - Symlink Attack http://openwall.com/lists/oss-security/2011/02/28/3 [oss-security] 20110228 Re: CVE Request: PEAR Installer 1.9.1 <= - Symlink Attack http://openwall.com/lists/oss-security/2011/02/28/12 http://openwall.com/lists/oss-security/2011/02/28/5 [oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 <= - Symlink Attack http://openwall.com/lists/oss-security/2011/03/01/4 http://openwall.com/lists/oss-security/2011/03/01/5 http://openwall.com/lists/oss-security/2011/03/01/7 http://openwall.com/lists/oss-security/2011/03/01/8 http://openwall.com/lists/oss-security/2011/03/01/9 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=546164 http://news.php.net/php.pear.cvs/61264 http://pear.php.net/advisory-20110228.txt http://pear.php.net/bugs/bug.php?id=18056 http://security-tracker.debian.org/tracker/CVE-2011-1072 http://svn.php.net/viewvc?view=revision&revision=308687 pear-pear-installer-symlink(65721) https://exchange.xforce.ibmcloud.com/vulnerabilities/65721 |
Copyright | Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |