Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.880867
Categoría:CentOS Local Security Checks
Título:CentOS Update for ecryptfs-utils CESA-2009:1307 centos5 i386
Resumen:The remote host is missing an update for the 'ecryptfs-utils'; package(s) announced via the referenced advisory.
Descripción:Summary:
The remote host is missing an update for the 'ecryptfs-utils'
package(s) announced via the referenced advisory.

Vulnerability Insight:
eCryptfs is a stacked, cryptographic file system. It is transparent to the
underlying file system and provides per-file granularity.

eCryptfs is released as a Technology Preview for Red Hat Enterprise Linux
5.4. These updated ecryptfs-utils packages have been upgraded to upstream
version 75, which provides a number of bug fixes and enhancements over the
previous version. In addition, these packages provide a graphical program
to help configure and use eCryptfs. To start this program, run the command:

ecryptfs-mount-helper-gui

Important: the syntax of certain eCryptfs mount options has changed. Users
who were previously using the initial Technology Preview release of
ecryptfs-utils are advised to refer to the ecryptfs(7) man page, and to
update any affected mount scripts and /etc/fstab entries for eCryptfs file
systems.

A disclosure flaw was found in the way the 'ecryptfs-setup-private' script
passed passphrases to the 'ecryptfs-wrap-passphrase' and
'ecryptfs-add-passphrase' commands as command line arguments. A local user
could obtain the passphrases of other users who were running the script
from the process listing. (CVE-2008-5188)

These updated packages provide various enhancements, including a mount
helper and supporting libraries to perform key management and mounting
functions.

Notable enhancements include:

* a new package, ecryptfs-utils-gui, has been added to this update. This
package depends on the pygtk2 and pygtk2-libglade packages and provides the
eCryptfs Mount Helper GUI program. To install the GUI, first install
ecryptfs-utils and then issue the following command:

yum install ecryptfs-utils-gui

(BZ#500997)

* the 'ecryptfs-rewrite-file' utility is now more intelligent when dealing
with non-existent files and with filtering special files such as the '.'
directory. In addition, the progress output from 'ecryptfs-rewrite-file'
has been improved and is now more explicit about the success status of each
target. (BZ#500813)

* descriptions of the 'verbose' flag and the 'verbosity=[x]' option, where
[x] is either 0 or 1, were missing from a number of eCryptfs manual pages,
and have been added. Refer to the eCryptfs man pages for important
information regarding using the verbose and/or verbosity options.
(BZ#470444)

These updated packages also fix the following bugs:

* mounting a directory using the eCryptfs mount helper with an RSA key that
was too small did not allow the eCryptfs mou ...

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
ecryptfs-utils on CentOS 5

Solution:
Please install the updated packages.

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2008-5188
http://www.openwall.com/lists/oss-security/2008/10/23/3
http://www.openwall.com/lists/oss-security/2008/10/29/4
http://www.openwall.com/lists/oss-security/2008/10/29/7
http://osvdb.org/49334
http://osvdb.org/50353
http://osvdb.org/50354
http://osvdb.org/50355
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9607
RedHat Security Advisories: RHSA-2009:1307
http://rhn.redhat.com/errata/RHSA-2009-1307.html
http://secunia.com/advisories/32382
http://secunia.com/advisories/36552
XForce ISS Database: ecryptfsutils-setupprivate-info-disclosure(46073)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46073
CopyrightCopyright (C) 2011 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.