![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.871509 |
Categoría: | Red Hat Local Security Checks |
Título: | RedHat Update for abrt and libreport RHSA-2015:2505-01 |
Resumen: | The remote host is missing an update for the 'abrt and libreport'; package(s) announced via the referenced advisory. |
Descripción: | Summary: The remote host is missing an update for the 'abrt and libreport' package(s) announced via the referenced advisory. Vulnerability Insight: ABRT (Automatic Bug Reporting Tool) is a tool to help users to detect defects in applications and to create a bug report with all the information needed by a maintainer to fix it. It uses a plug-in system to extend its functionality. libreport provides an API for reporting different problems in applications to different bug targets, such as Bugzilla, FTP, and Trac. It was found that the ABRT debug information installer (abrt-action-install-debuginfo-to-abrt-cache) did not use temporary directories in a secure way. A local attacker could use the flaw to create symbolic links and files at arbitrary locations as the abrt user. (CVE-2015-5273) It was discovered that the kernel-invoked coredump processor provided by ABRT did not handle symbolic links correctly when writing core dumps of ABRT programs to the ABRT dump directory (/var/spool/abrt). A local attacker with write access to an ABRT problem directory could use this flaw to escalate their privileges. (CVE-2015-5287) It was found that ABRT may have exposed unintended information to Red Hat Bugzilla during crash reporting. A bug in the libreport library caused changes made by a user in files included in a crash report to be discarded. As a result, Red Hat Bugzilla attachments may contain data that was not intended to be made public, including host names, IP addresses, or command line options. (CVE-2015-5302) This flaw did not affect default installations of ABRT on Red Hat Enterprise Linux as they do not post data to Red Hat Bugzilla. This feature can however be enabled, potentially impacting modified ABRT instances. As a precaution, Red Hat has identified bugs filed by such non-default Red Hat Enterprise Linux users of ABRT and marked them private. Red Hat would like to thank Philip Pettersson of Samsung for reporting the CVE-2015-5273 and CVE-2015-5287 issues. The CVE-2015-5302 issue was discovered by Bastien Nocera of Red Hat. All users of abrt and libreport are advised to upgrade to these updated packages, which contain backported patches to correct these issues. Affected Software/OS: abrt and libreport on Red Hat Enterprise Linux Server (v. 7) Solution: Please Install the Updated Packages. CVSS Score: 6.9 CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-5273 78113 http://www.securityfocus.com/bid/78113 FEDORA-2015-79c1758468 http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172809.html RHSA-2015:2505 http://rhn.redhat.com/errata/RHSA-2015-2505.html [oss-security] 20151201 CVE-2015-5273 + CVE-2015-5287, abrt local root in Centos/Fedora/RHEL http://www.openwall.com/lists/oss-security/2015/12/01/1 http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html https://bugzilla.redhat.com/show_bug.cgi?id=1262252 https://github.com/abrt/abrt/commit/50ee8130fb4cd4ef1af7682a2c85dd99cb99424e Common Vulnerability Exposure (CVE) ID: CVE-2015-5287 38832 https://www.exploit-db.com/exploits/38832/ 78137 http://www.securityfocus.com/bid/78137 http://packetstormsecurity.com/files/154592/ABRT-sosreport-Privilege-Escalation.html https://bugzilla.redhat.com/show_bug.cgi?id=1266837 https://github.com/abrt/abrt/commit/3c1b60cfa62d39e5fff5a53a5bc53dae189e740e Common Vulnerability Exposure (CVE) ID: CVE-2015-5302 77685 http://www.securityfocus.com/bid/77685 FEDORA-2015-6542ab6d3a http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172695.html RHSA-2015:2504 http://rhn.redhat.com/errata/RHSA-2015-2504.html https://bugzilla.redhat.com/show_bug.cgi?id=1270903 https://github.com/abrt/libreport/commit/257578a23d1537a2d235aaa2b1488ee4f818e360 |
Copyright | Copyright (C) 2015 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |