Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.880822
Categoría:CentOS Local Security Checks
Título:CentOS Update for libvolume_id-095 CESA-2009:0427 centos5 i386
Resumen:The remote host is missing an update for the 'libvolume_id-095'; package(s) announced via the referenced advisory.
Descripción:Summary:
The remote host is missing an update for the 'libvolume_id-095'
package(s) announced via the referenced advisory.

Vulnerability Insight:
udev provides a user-space API and implements a dynamic device directory,
providing only the devices present on the system. udev replaces devfs in
order to provide greater hot plug functionality. Netlink is a datagram
oriented service, used to transfer information between kernel modules and
user-space processes.

It was discovered that udev did not properly check the origin of Netlink
messages. A local attacker could use this flaw to gain root privileges via
a crafted Netlink message sent to udev, causing it to create a
world-writable block device file for an existing system block device (for
example, the root file system). (CVE-2009-1185)

Red Hat would like to thank Sebastian Krahmer of the SUSE Security Team for
responsibly reporting this flaw.

Users of udev are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing the
update, the udevd daemon will be restarted automatically.

Affected Software/OS:
libvolume_id-095 on CentOS 5

Solution:
Please install the updated packages.

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2009-1185
1022067
http://www.securitytracker.com/id?1022067
20090417 rPSA-2009-0063-1 udev
http://www.securityfocus.com/archive/1/502752/100/0/threaded
20090711 VMSA-2009-0009 ESX Service Console updates for udev, sudo, and curl
http://www.securityfocus.com/archive/1/504849/100/0/threaded
34536
http://www.securityfocus.com/bid/34536
34731
http://secunia.com/advisories/34731
34750
http://secunia.com/advisories/34750
34753
http://secunia.com/advisories/34753
34771
http://secunia.com/advisories/34771
34776
http://secunia.com/advisories/34776
34785
http://secunia.com/advisories/34785
34787
http://secunia.com/advisories/34787
34801
http://secunia.com/advisories/34801
35766
http://secunia.com/advisories/35766
8572
https://www.exploit-db.com/exploits/8572
ADV-2009-1053
http://www.vupen.com/english/advisories/2009/1053
ADV-2009-1865
http://www.vupen.com/english/advisories/2009/1865
DSA-1772
http://www.debian.org/security/2009/dsa-1772
FEDORA-2009-3711
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00463.html
FEDORA-2009-3712
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00462.html
GLSA-200904-18
http://www.gentoo.org/security/en/glsa/glsa-200904-18.xml
MDVSA-2009:103
http://www.mandriva.com/security/advisories?name=MDVSA-2009:103
MDVSA-2009:104
http://www.mandriva.com/security/advisories?name=MDVSA-2009:104
RHSA-2009:0427
http://www.redhat.com/support/errata/RHSA-2009-0427.html
SSA:2009-111-01
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.446399
SUSE-SA:2009:020
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00006.html
SUSE-SA:2009:025
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00012.html
USN-758-1
http://www.ubuntu.com/usn/usn-758-1
[Security-announce] 20090710 VMSA-2009-0009 ESX Service Console updates for udev, sudo, and curl
http://lists.vmware.com/pipermail/security-announce/2009/000060.html
http://git.kernel.org/?p=linux/hotplug/udev.git%3Ba=commitdiff%3Bh=e2b362d9f23d4c63018709ab5f81a02f72b91e75
http://git.kernel.org/?p=linux/hotplug/udev.git%3Ba=commitdiff%3Bh=e86a923d508c2aed371cdd958ce82489cf2ab615
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://wiki.rpath.com/Advisories:rPSA-2009-0063
http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0063
http://www.vmware.com/security/advisories/VMSA-2009-0009.html
https://bugzilla.redhat.com/show_bug.cgi?id=495051
https://launchpad.net/bugs/cve/2009-1185
oval:org.mitre.oval:def:10925
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10925
oval:org.mitre.oval:def:5975
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5975
CopyrightCopyright (C) 2011 Greenbone Networks GmbH

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.