![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.56143 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DSA-903-1) |
Summary: | The remote host is missing an update for the Debian 'unzip' package(s) announced via the DSA-903-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'unzip' package(s) announced via the DSA-903-1 advisory. Vulnerability Insight: The unzip update in DSA 903 contained a regression so that symbolic links that are resolved later in a zip archive aren't supported anymore. This update corrects this behaviour. For completeness, below please find the original advisory text: Imran Ghory discovered a race condition in the permissions setting code in unzip. When decompressing a file in a directory an attacker has access to, unzip could be tricked to set the file permissions to a different file the user has permissions to. For the old stable distribution (woody) this problem has been fixed in version 5.50-1woody5. For the stable distribution (sarge) this problem has been fixed in version 5.52-1sarge3. For the unstable distribution (sid) this problem has been fixed in version 5.52-6. We recommend that you upgrade your unzip package. Affected Software/OS: 'unzip' package(s) on Debian 3.0, Debian 3.1. Solution: Please install the updated package(s). CVSS Score: 1.2 CVSS Vector: AV:L/AC:H/Au:N/C:P/I:N/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2005-2475 BugTraq ID: 14450 http://www.securityfocus.com/bid/14450 Bugtraq: 20050801 unzip TOCTOU file-permissions vulnerability (Google Search) http://marc.info/?l=bugtraq&m=112300046224117&w=2 Debian Security Information: DSA-903 (Google Search) http://www.debian.org/security/2005/dsa-903 http://www.mandriva.com/security/advisories?name=MDKSA-2005:197 http://www.osvdb.org/18530 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9975 http://www.redhat.com/support/errata/RHSA-2007-0203.html SCO Security Bulletin: SCOSA-2005.39 ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.39/SCOSA-2005.39.txt http://secunia.com/advisories/16309 http://secunia.com/advisories/16985 http://secunia.com/advisories/17006 http://secunia.com/advisories/17045 http://secunia.com/advisories/17342 http://secunia.com/advisories/17653 http://secunia.com/advisories/25098 http://securityreason.com/securityalert/32 http://www.trustix.org/errata/2005/0053/ http://www.ubuntu.com/usn/usn-191-1 |
Copyright | Copyright (C) 2008 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |