|Category:||Ubuntu Local Security Checks|
|Title:||Ubuntu USN-278-1 (gdm)|
|Summary:||Ubuntu USN-278-1 (gdm)|
The remote host is missing an update to gdm
announced via advisory USN-278-1.
A security issue affects the following Ubuntu releases:
Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)
The following packages are affected: gdm
Marcus Meissner discovered a race condition in gdm's handling of the
/.ICEauthority file permissions. A local attacker could exploit this
to become the owner of an arbitrary file in the system. When getting
control over automatically executed scripts (like cron jobs), the
attacker could eventually leverage this flaw to execute arbitrary
commands with root privileges.
The problem can be corrected by upgrading the affected package to
version 220.127.116.11-0ubuntu7.1 (for Ubuntu 5.04) or 18.104.22.168-0ubuntu1.1
(for Ubuntu 5.10). In general, a standard system upgrade is
sufficient to effect the necessary changes.
Risk factor : Medium
BugTraq ID: 17635|
Common Vulnerability Exposure (CVE) ID: CVE-2006-1057
Debian Security Information: DSA-1040 (Google Search)
XForce ISS Database: gdm-slavec-symlink(26092)
|Copyright||Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com|
|This is only one of 58880 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.