Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.702765
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-2765-1)
Summary:The remote host is missing an update for the Debian 'davfs2' package(s) announced via the DSA-2765-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'davfs2' package(s) announced via the DSA-2765-1 advisory.

Vulnerability Insight:
Davfs2, a filesystem client for WebDAV, calls the function system() insecurely while is setuid root. This might allow a privilege escalation.

For the oldstable distribution (squeeze), this problem has been fixed in version 1.4.6-1.1+squeeze1.

For the stable distribution (wheezy), this problem has been fixed in version 1.4.6-1.1+deb7u1.

For the testing distribution (jessie), this problem has been fixed in version 1.4.7-3.

For the unstable distribution (sid), this problem has been fixed in version 1.4.7-3.

We recommend that you upgrade your davfs2 packages.

Affected Software/OS:
'davfs2' package(s) on Debian 6, Debian 7.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-4362
62445
http://www.securityfocus.com/bid/62445
97416
http://osvdb.org/97416
97417
http://osvdb.org/97417
DSA-2765
http://www.debian.org/security/2013/dsa-2765
GLSA-201612-02
https://security.gentoo.org/glsa/201612-02
[oss-security] 20130918 Re: CVE request: davfs2 - Unsecure use of system()
http://seclists.org/oss-sec/2013/q3/627
http://savannah.nongnu.org/bugs/?40034
CopyrightCopyright (C) 2013 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.