Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.54139
Category:SuSE Local Security Checks
Title:SuSE Security Advisory SUSE-SA:2002:030 (i4l)
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory SUSE-SA:2002:030.

The i4l package contains several programs for ISDN maintenance and
connectivity on Linux. The ipppd program which is part of the package
contained various buffer overflows and format string bugs. Since ipppd
is installed setuid to root and executable by users of group 'dialout'
this may allow attackers with appropriate group membership to execute
arbitrary commands as root.

The i4l package is installed by default and also vulnerable if you do
not have a ISDN setup. The buffer overflows and format string bugs have
been fixed. We strongly recommend an update of the i4l package.

Solution:
If you do not consider updating the package it is also possible to
remove the setuid bit from /usr/sbin/ipppd as a temporary workaround.
The SuSE Security Team is aware of a published exploit for ipppd
that gives a local attacker root privileges so you should either update
the package or remove the setuid bit from ipppd.

Update your system with the packages as indicated in
the referenced security advisory.

http://www.securityspace.com/smysecure/catid.html?in=SUSE-SA:2002:030

Risk factor : High

CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.