![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.881475 |
Category: | CentOS Local Security Checks |
Title: | CentOS Update for python-paste-script CESA-2012:1206 centos6 |
Summary: | The remote host is missing an update for the 'python-paste-script'; package(s) announced via the referenced advisory. |
Description: | Summary: The remote host is missing an update for the 'python-paste-script' package(s) announced via the referenced advisory. Vulnerability Insight: Python Paste provides middleware for building and running Python web applications. The python-paste-script package includes paster, a tool for working with and running Python Paste applications. It was discovered that paster did not drop supplementary group privileges when started by the root user. Running 'paster serve' as root to start a Python web application that will run as a non-root user and group resulted in that application running with root group privileges. This could possibly allow a remote attacker to gain access to files that should not be accessible to the application. (CVE-2012-0878) All paster users should upgrade to this updated package, which contains a backported patch to resolve this issue. All running paster instances configured to drop privileges must be restarted for this update to take effect. Affected Software/OS: python-paste-script on CentOS 6 Solution: Please install the updated packages. CVSS Score: 5.1 CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-0878 48812 http://secunia.com/advisories/48812 50410 http://secunia.com/advisories/50410 RHSA-2012:1206 http://rhn.redhat.com/errata/RHSA-2012-1206.html [oss-security] 20120223 CVE Request -- python-paste-script: Supplementary groups not dropped when started an application with "paster serve" as root http://www.openwall.com/lists/oss-security/2012/02/23/1 [oss-security] 20120223 Re: CVE Request -- python-paste-script: Supplementary groups not dropped when started an application with "paster serve" as root http://www.openwall.com/lists/oss-security/2012/02/23/4 http://groups.google.com/group/paste-users/browse_thread/thread/2aa651ba331c2471 https://bitbucket.org/ianb/pastescript/changeset/a19e462769b4 https://bitbucket.org/ianb/pastescript/pull-request/3/fix-group-permissions-for-pastescriptserve https://bugzilla.redhat.com/show_bug.cgi?id=796790 |
Copyright | Copyright (C) 2012 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |