Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.50625
Category:Mandrake Local Security Checks
Title:Mandrake Security Advisory MDKSA-2004:145 (rp-pppoe)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to rp-pppoe
announced via advisory MDKSA-2004:145.

Max Vozeler discovered a vulnerability in pppoe, part of the rp-pppoe
package. When pppoe is running setuid root, an attacker can overwrite
any file on the system. Mandrakelinux does not install pppoe setuid
root, however the packages have been patched to prevent this problem.

Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1,
Multi Network Firewall 8.2


Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2004:145
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0564

Risk factor : Medium

CVSS Score:
2.1

Cross-Ref: BugTraq ID: 11315
Common Vulnerability Exposure (CVE) ID: CVE-2004-0564
http://www.securityfocus.com/bid/11315
Bugtraq: 20041208 Re: MDKSA-2004:145 - Updated rp-pppoe packages fix vulnerability (Google Search)
http://marc.info/?l=bugtraq&m=110253341209450&w=2
Debian Security Information: DSA-557 (Google Search)
http://www.debian.org/security/2004/dsa-557
http://www.fedoralegacy.org/updates/FC1/2005-11-14-FLSA_2005_152794__Updated_rp_pppoe_package_fixes_security_issue.html
http://marc.info/?l=bugtraq&m=110247119200510&w=2
XForce ISS Database: pppoe-file-overwrite(17576)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17576
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.