![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.66318 |
Category: | Red Hat Local Security Checks |
Title: | RedHat Security Advisory RHSA-2009:1619 |
Summary: | The remote host is missing updates announced in;advisory RHSA-2009:1619.;;Dstat is a versatile replacement for the vmstat, iostat, and netstat tools.;Dstat can be used for performance tuning tests, benchmarks, and;troubleshooting.;;Robert Buchholz of the Gentoo Security Team reported a flaw in the Python;module search path used in dstat. If a local attacker could trick a;local user into running dstat from a directory containing a Python script;that is named like an importable module, they could execute arbitrary code;with the privileges of the user running dstat. (CVE-2009-3894);;All dstat users should upgrade to this updated package, which contains a;backported patch to correct this issue. |
Description: | Summary: The remote host is missing updates announced in advisory RHSA-2009:1619. Dstat is a versatile replacement for the vmstat, iostat, and netstat tools. Dstat can be used for performance tuning tests, benchmarks, and troubleshooting. Robert Buchholz of the Gentoo Security Team reported a flaw in the Python module search path used in dstat. If a local attacker could trick a local user into running dstat from a directory containing a Python script that is named like an importable module, they could execute arbitrary code with the privileges of the user running dstat. (CVE-2009-3894) All dstat users should upgrade to this updated package, which contains a backported patch to correct this issue. Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date CVSS Score: 4.4 CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-3894 37131 http://www.securityfocus.com/bid/37131 37445 http://secunia.com/advisories/37445 37457 http://secunia.com/advisories/37457 60511 http://osvdb.org/60511 GLSA-200911-04 http://security.gentoo.org/glsa/glsa-200911-04.xml MDVSA-2009:341 http://www.mandriva.com/security/advisories?name=MDVSA-2009:341 RHSA-2009:1619 http://www.redhat.com/support/errata/RHSA-2009-1619.html http://bugs.gentoo.org/show_bug.cgi?id=293497 http://svn.rpmforge.net/svn/trunk/tools/dstat/ChangeLog https://bugzilla.redhat.com/show_bug.cgi?id=538459 oval:org.mitre.oval:def:8969 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8969 |
Copyright | Copyright (C) 2009 E-Soft Inc. |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |