![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.71456 |
Category: | Mandrake Local Security Checks |
Title: | Mandriva Security Advisory MDVSA-2012:114 (apache-mod_auth_openid) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to apache-mod_auth_openid announced via advisory MDVSA-2012:114. A vulnerability has been discovered and corrected in apache-mod_auth_openid: mod_auth_openid before 0.7 for Apache uses world-readable permissions for /tmp/mod_auth_openid.db, which allows local users to obtain session ids (CVE-2012-2760). The updated packages have been upgraded to the latest version (0.7) which is not affected by this issue. Affected: Enterprise Server 5.0 Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2012:114 Risk factor : High |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-2760 BugTraq ID: 53661 http://www.securityfocus.com/bid/53661 http://www.exploit-db.com/exploits/18917 http://archives.neohapsis.com/archives/fulldisclosure/2012-05/0235.html http://www.mandriva.com/security/advisories?name=MDVSA-2012:114 http://packetstormsecurity.org/files/112991/Mod_Auth_OpenID-Session-Stealing.html https://github.com/bmuller/mod_auth_openid/pull/30 http://www.osvdb.org/82139 http://secunia.com/advisories/49247 XForce ISS Database: modauthopenid-database-info-disclosure(75813) https://exchange.xforce.ibmcloud.com/vulnerabilities/75813 |
Copyright | Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |