|Category:||FreeBSD Local Security Checks|
|Title:||FreeBSD Security Advisory (FreeBSD-SA-05:20.cvsbug.asc)|
|Summary:||FreeBSD Security Advisory (FreeBSD-SA-05:20.cvsbug.asc)|
The remote host is missing an update to the system
as announced in the referenced advisory FreeBSD-SA-05:20.cvsbug.asc
cvsbug(1) is a utility for reporting problems in the CVS revision
control system. It is based on the GNATS send-pr(1) utility.
A temporary file is created, used, deleted, and then re-created with
the same name. This creates a window during which an attacker could
replace the file with a link to another file.
While cvsbug(1) is based on the send-pr(1) utility, this problem does
not exist in the version of send-pr(1) distributed with FreeBSD.
Upgrade your system to the appropriate stable release
or security branch dated after the correction date
Common Vulnerability Exposure (CVE) ID: CVE-2005-2693|
Debian Security Information: DSA-802 (Google Search)
Debian Security Information: DSA-806 (Google Search)
FreeBSD Security Advisory: FreeBSD-SA-05:20
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 56160 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.