![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.55020 |
Category: | Ubuntu Local Security Checks |
Title: | Ubuntu USN-162-1 (ekg) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to ekg announced via advisory USN-162-1. A security issue affects the following Ubuntu releases: Ubuntu 5.04 (Hoary Hedgehog) The following packages are affected: ekg libgadu3 Marcin Owsiany and Wojtek Kaniewski discovered that some contributed scripts (contrib/ekgh, contrib/ekgnv.sh, and contrib/getekg.sh) in the ekg package created temporary files in an insecure way, which allowed exploitation of a race condition to create or overwrite files with the privileges of the user invoking the script. (CVE-2005-1850) Marcin Owsiany and Wojtek Kaniewski discovered a shell command injection vulnerability in a contributed utility (contrib/scripts/ekgbot-pre1.py). By sending specially crafted content to the bot, an attacker could exploit this to execute arbitrary code with the privileges of the user running ekgbot. (CVE-2005-1851) Marcin Ålusarz discovered an integer overflow in the Gadu library. By sending a specially crafted incoming message, a remote attacker could execute arbitrary code with the privileges of the application using libgadu. (CVE-2005-1852) Eric Romang discovered that another contributed script (contrib/scripts/linki.py) created temporary files in an insecure way, which allowed exploitation of a race condition to create or overwrite files with the privileges of the user invoking the script. (CVE-2005-1916) Grzegorz JaÅkiewicz discovered several integer overflows in the Gadu library. A remote attacker could exploit this to crash the Gadu client application or even execute arbitrary code with the privileges of the user by sending specially crafted messages. (CVE-2005-2369) Szymon Zygmunt and MichaÅ Bartoszkiewicz discovered a memory alignment error in the Gadu library. By sending specially crafted messages, a remote attacker could crash the application using the library. (CVE-2005-2370) Marcin Ålusarz discovered that the Gadu library did not properly handle endianess conversion in some cases. This caused invalid behavior on big endian architectures. The only affected supported architecture is powerpc. (CVE-2005-2448) Solution: The problem can be corrected by upgrading the affected package to version 1:1.5-4ubuntu1.2. In general, a standard system upgrade is sufficient to effect the necessary changes. If you use the Instant Messaging application Kopete, you need to restart it after the upgrade since it uses the libgadu3 library package. http://www.securityspace.com/smysecure/catid.html?in=USN-162-1 Risk factor : Critical CVSS Score: 10.0 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2005-1850 Bugtraq: 20050721 Multiple vulnerabilities in libgadu and ekg package (Google Search) http://marc.info/?l=bugtraq&m=112198499417250&w=2 Debian Security Information: DSA-760 (Google Search) http://www.debian.org/security/2005/dsa-760 Common Vulnerability Exposure (CVE) ID: CVE-2005-1851 Common Vulnerability Exposure (CVE) ID: CVE-2005-1852 BugTraq ID: 14345 http://www.securityfocus.com/bid/14345 http://lwn.net/Articles/144724/ http://security.gentoo.org/glsa/glsa-200507-23.xml http://www.gentoo.org/security/en/glsa/glsa-200507-26.xml https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9532 http://www.redhat.com/support/errata/RHSA-2005-639.html http://secunia.com/advisories/16140 http://secunia.com/advisories/16155 http://secunia.com/advisories/16211 http://secunia.com/advisories/16242 SuSE Security Announcement: SUSE-SR:2005:019 (Google Search) http://www.novell.com/linux/security/advisories/2005_19_sr.html Common Vulnerability Exposure (CVE) ID: CVE-2005-1916 Bugtraq: 20050705 ekg insecure temporary file creation and arbitrary code execution (Google Search) http://marc.info/?l=bugtraq&m=112060146011122&w=2 http://www.zataz.net/adviso/ekg-06062005.txt Common Vulnerability Exposure (CVE) ID: CVE-2005-2369 BugTraq ID: 14415 http://www.securityfocus.com/bid/14415 Debian Security Information: DSA-813 (Google Search) http://www.debian.org/security/2005/dsa-813 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10281 Common Vulnerability Exposure (CVE) ID: CVE-2005-2370 BugTraq ID: 24600 http://www.securityfocus.com/bid/24600 Debian Security Information: DSA-1318 (Google Search) http://www.debian.org/security/2007/dsa-1318 http://www.securityfocus.com/archive/1/426078/100/0/threaded https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10456 http://www.redhat.com/support/errata/RHSA-2005-627.html http://secunia.com/advisories/16265 Common Vulnerability Exposure (CVE) ID: CVE-2005-2448 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11263 http://secunia.com/advisories/16363 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |