![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.902477 |
Category: | RPC |
Title: | CDE ToolTalk RPC Database Server Multiple Vulnerabilities |
Summary: | the CDE ToolTalk Database Server is prone to multiple vulnerabilities. |
Description: | Summary: the CDE ToolTalk Database Server is prone to multiple vulnerabilities. Vulnerability Insight: Multiple flaws are due to: - an error in the handling symbolic link. The server does not check to ensure that it is not a symbolic link. If an attacker creates a symbolic link on the filesystem with the path/filename of the logfile, transaction data will be written to the destination file as root. - no available checks to restrict the range of the index value. Consequently, malicious file descriptor values supplied by remote clients may cause writes to occur far beyond the table in memory. The only value written is a NULL word, limiting the consequences. Vulnerability Impact: Successful exploitation could allow attackers to remotely deleting arbitrary files and creating arbitrary directory entries. Further, attackers might be able to crash the ToolTalk RPC database server, denying service to legitimate users. Affected Software/OS: CDE ToolTalk RPC database server. Solution: Apply the patch from the referenced advisory. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2002-0677 Bugtraq: 20020710 [CORE-20020528] Multiple vulnerabilities in ToolTalk Database server (Google Search) http://marc.info/?l=bugtraq&m=102635906423617&w=2 Caldera Security Advisory: CSSA-2002-SCO.28 ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.28/CSSA-2002-SCO.28.txt http://www.cert.org/advisories/CA-2002-20.html CERT/CC vulnerability note: VU#975403 http://www.kb.cert.org/vuls/id/975403 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1099 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A91 SGI Security Advisory: 20021102-02-P ftp://patches.sgi.com/support/free/security/advisories/20021102-02-P Common Vulnerability Exposure (CVE) ID: CVE-2002-0678 AIX APAR: IY32368 http://archives.neohapsis.com/archives/aix/2002-q3/0002.html AIX APAR: IY32370 BugTraq ID: 5083 http://www.securityfocus.com/bid/5083 CERT/CC vulnerability note: VU#299816 http://www.kb.cert.org/vuls/id/299816 HPdes Security Advisory: HPSBUX0207-199 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0207-199 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A175 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2770 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A80 SGI Security Advisory: 20021101-01-P ftp://patches.sgi.com/support/free/security/advisories/20021101-01-P http://www.iss.net/security_center/static/9527.php |
Copyright | Copyright (C) 2011 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |