![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.12.2005.162.1 |
Category: | Ubuntu Local Security Checks |
Title: | Ubuntu: Security Advisory (USN-162-1) |
Summary: | The remote host is missing an update for the 'ekg' package(s) announced via the USN-162-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'ekg' package(s) announced via the USN-162-1 advisory. Vulnerability Insight: Marcin Owsiany and Wojtek Kaniewski discovered that some contributed scripts (contrib/ekgh, contrib/ekgnv.sh, and contrib/getekg.sh) in the ekg package created temporary files in an insecure way, which allowed exploitation of a race condition to create or overwrite files with the privileges of the user invoking the script. (CAN-2005-1850) Marcin Owsiany and Wojtek Kaniewski discovered a shell command injection vulnerability in a contributed utility (contrib/scripts/ekgbot-pre1.py). By sending specially crafted content to the bot, an attacker could exploit this to execute arbitrary code with the privileges of the user running ekgbot. (CAN-2005-1851) Marcin Slusarz discovered an integer overflow in the Gadu library. By sending a specially crafted incoming message, a remote attacker could execute arbitrary code with the privileges of the application using libgadu. (CAN-2005-1852) Eric Romang discovered that another contributed script (contrib/scripts/linki.py) created temporary files in an insecure way, which allowed exploitation of a race condition to create or overwrite files with the privileges of the user invoking the script. (CAN-2005-1916) Grzegorz Jaskiewicz discovered several integer overflows in the Gadu library. A remote attacker could exploit this to crash the Gadu client application or even execute arbitrary code with the privileges of the user by sending specially crafted messages. (CAN-2005-2369) Szymon Zygmunt and Michal Bartoszkiewicz discovered a memory alignment error in the Gadu library. By sending specially crafted messages, a remote attacker could crash the application using the library. (CAN-2005-2370) Marcin Slusarz discovered that the Gadu library did not properly handle endianness conversion in some cases. This caused invalid behavior on big endian architectures. The only affected supported architecture is powerpc. (CAN-2005-2448) Affected Software/OS: 'ekg' package(s) on Ubuntu 5.04. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2005-1850 Bugtraq: 20050721 Multiple vulnerabilities in libgadu and ekg package (Google Search) http://marc.info/?l=bugtraq&m=112198499417250&w=2 Debian Security Information: DSA-760 (Google Search) http://www.debian.org/security/2005/dsa-760 Common Vulnerability Exposure (CVE) ID: CVE-2005-1851 Common Vulnerability Exposure (CVE) ID: CVE-2005-1852 BugTraq ID: 14345 http://www.securityfocus.com/bid/14345 http://lwn.net/Articles/144724/ http://security.gentoo.org/glsa/glsa-200507-23.xml http://www.gentoo.org/security/en/glsa/glsa-200507-26.xml https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9532 http://www.redhat.com/support/errata/RHSA-2005-639.html http://secunia.com/advisories/16140 http://secunia.com/advisories/16155 http://secunia.com/advisories/16211 http://secunia.com/advisories/16242 SuSE Security Announcement: SUSE-SR:2005:019 (Google Search) http://www.novell.com/linux/security/advisories/2005_19_sr.html Common Vulnerability Exposure (CVE) ID: CVE-2005-1916 Bugtraq: 20050705 ekg insecure temporary file creation and arbitrary code execution (Google Search) http://marc.info/?l=bugtraq&m=112060146011122&w=2 http://www.zataz.net/adviso/ekg-06062005.txt Common Vulnerability Exposure (CVE) ID: CVE-2005-2369 BugTraq ID: 14415 http://www.securityfocus.com/bid/14415 Debian Security Information: DSA-813 (Google Search) http://www.debian.org/security/2005/dsa-813 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10281 Common Vulnerability Exposure (CVE) ID: CVE-2005-2370 BugTraq ID: 24600 http://www.securityfocus.com/bid/24600 Debian Security Information: DSA-1318 (Google Search) http://www.debian.org/security/2007/dsa-1318 http://www.securityfocus.com/archive/1/426078/100/0/threaded https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10456 http://www.redhat.com/support/errata/RHSA-2005-627.html http://secunia.com/advisories/16265 Common Vulnerability Exposure (CVE) ID: CVE-2005-2448 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11263 http://secunia.com/advisories/16363 |
Copyright | Copyright (C) 2022 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |