![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.902477 |
Categoría: | RPC |
Título: | CDE ToolTalk RPC Database Server Multiple Vulnerabilities |
Resumen: | the CDE ToolTalk Database Server is prone to multiple vulnerabilities. |
Descripción: | Summary: the CDE ToolTalk Database Server is prone to multiple vulnerabilities. Vulnerability Insight: Multiple flaws are due to: - an error in the handling symbolic link. The server does not check to ensure that it is not a symbolic link. If an attacker creates a symbolic link on the filesystem with the path/filename of the logfile, transaction data will be written to the destination file as root. - no available checks to restrict the range of the index value. Consequently, malicious file descriptor values supplied by remote clients may cause writes to occur far beyond the table in memory. The only value written is a NULL word, limiting the consequences. Vulnerability Impact: Successful exploitation could allow attackers to remotely deleting arbitrary files and creating arbitrary directory entries. Further, attackers might be able to crash the ToolTalk RPC database server, denying service to legitimate users. Affected Software/OS: CDE ToolTalk RPC database server. Solution: Apply the patch from the referenced advisory. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2002-0677 Bugtraq: 20020710 [CORE-20020528] Multiple vulnerabilities in ToolTalk Database server (Google Search) http://marc.info/?l=bugtraq&m=102635906423617&w=2 Caldera Security Advisory: CSSA-2002-SCO.28 ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.28/CSSA-2002-SCO.28.txt http://www.cert.org/advisories/CA-2002-20.html CERT/CC vulnerability note: VU#975403 http://www.kb.cert.org/vuls/id/975403 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1099 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A91 SGI Security Advisory: 20021102-02-P ftp://patches.sgi.com/support/free/security/advisories/20021102-02-P Common Vulnerability Exposure (CVE) ID: CVE-2002-0678 AIX APAR: IY32368 http://archives.neohapsis.com/archives/aix/2002-q3/0002.html AIX APAR: IY32370 BugTraq ID: 5083 http://www.securityfocus.com/bid/5083 CERT/CC vulnerability note: VU#299816 http://www.kb.cert.org/vuls/id/299816 HPdes Security Advisory: HPSBUX0207-199 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0207-199 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A175 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2770 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A80 SGI Security Advisory: 20021101-01-P ftp://patches.sgi.com/support/free/security/advisories/20021101-01-P http://www.iss.net/security_center/static/9527.php |
Copyright | Copyright (C) 2011 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |