English | Deutsch | Español | Português
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
    Search 86979 CVE descriptions
and 47891 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:FreeBSD Local Security Checks
Title:FreeBSD Security Advisory (FreeBSD-SA-07:01.jail.asc)
Summary:FreeBSD Security Advisory (FreeBSD-SA-07:01.jail.asc)
Description:The remote host is missing an update to the system
as announced in the referenced advisory FreeBSD-SA-07:01.jail.asc

The jail(2) system call allows a system administrator to lock a process
and all of its descendants inside an environment with a very limited
ability to affect the system outside that environment, even for
processes with superuser privileges. It is an extension of, but
far more powerful than, the traditional UNIX chroot(2) system call.

The host's jail rc.d(8) script can be used to start and stop jails
automatically on system boot/shutdown.

In multiple situations the host's jail rc.d(8) script does not check if
a path inside the jail file system structure is a symbolic link before
using the path. In particular this is the case when writing the
output from the jail start-up to /var/log/console.log and when
mounting and unmounting file systems inside the jail directory

Upgrade your system to the appropriate stable release
or security branch dated after the correction date

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-0166
FreeBSD Security Advisory: FreeBSD-SA-07:01
BugTraq ID: 22011
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 47891 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
Registered User Login

 Forgot userid or passwd?

Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2016 E-Soft Inc. All rights reserved.