|Category:||Debian Local Security Checks|
|Title:||Debian Security Advisory DSA 446-1 (synaesthesia)|
|Summary:||Debian Security Advisory DSA 446-1 (synaesthesia)|
|Description:||The remote host is missing an update to synaesthesia|
announced via advisory DSA 446-1.
During an audit, Ulf Harnhammar discovered a vulnerability in
synaesthesia, a program which represents sounds visually.
synaesthesia created its configuration file while holding root
privileges, allowing a local user to create files owned by root and
writable by the user's primary group. This type of vulnerability can
usually be easily exploited to execute arbitary code with root
privileges by various means.
For the current stable distribution (woody) this problem has been
fixed in version 2.1-2.1woody1.
The unstable distribution (sid) is not affected by this problem, because
synaesthesia is no longer setuid.
We recommend that you update your synaesthesia package.
BugTraq ID: 9713|
Common Vulnerability Exposure (CVE) ID: CVE-2004-0160
Debian Security Information: DSA-446 (Google Search)
XForce ISS Database: synaesthesia-configuration-symlink-attack(15279)
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 39644 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.