File: gentoo_GLSA-200405-05.nasl

package info (click to toggle)
nessus-plugins 2.2.8-1.1
  • links: PTS
  • area: main
  • in suites: etch, etch-m68k
  • size: 15,508 kB
  • ctags: 251
  • sloc: sh: 8,346; ansic: 4,452; pascal: 3,089; perl: 704; makefile: 172; php: 1
file content (62 lines) | stat: -rw-r--r-- 2,040 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
# This script was automatically generated from 
#  http://www.gentoo.org/security/en/glsa/glsa-200405-05.xml
# It is released under the Nessus Script Licence.
# The messages are release under the Creative Commons - Attribution /
# Share Alike license. See http://creativecommons.org/licenses/by-sa/2.0/
#
# Avisory is copyright 2001-2005 Gentoo Foundation, Inc.
# GLSA2nasl Convertor is copyright 2004 Michel Arboi <mikhail@nessus.org>

if (! defined_func('bn_random')) exit(0);

if (description)
{
 script_id(14491);
 script_version("$Revision: 1.3 $");
 script_xref(name: "GLSA", value: "200405-05");
 script_cve_id("CVE-2004-0233");

 desc = 'The remote host is affected by the vulnerability described in GLSA-200405-05
(Utempter symlink vulnerability)


    Utempter contains a vulnerability that may allow local users to overwrite
    arbitrary files via a symlink attack.
  
Impact

    This vulnerability may allow arbitrary files to be overwritten with root
    privileges.
  
Workaround

    There is no known workaround at this time. All users are advised to upgrade
    to the latest available version of utempter.
  
References:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0233


Solution: 
    All users of utempter should upgrade to the latest stable version:
    # emerge sync
    # emerge -pv ">=sys-apps/utempter-0.5.5.4"
    # emerge ">=sys-apps/utempter-0.5.5.4"
  

Risk factor : Medium
';
 script_description(english: desc);
 script_copyright(english: "(C) 2005 Michel Arboi <mikhail@nessus.org>");
 script_name(english: "[GLSA-200405-05] Utempter symlink vulnerability");
 script_category(ACT_GATHER_INFO);
 script_family(english: "Gentoo Local Security Checks");
 script_dependencies("ssh_get_info.nasl");
 script_require_keys('Host/Gentoo/qpkg-list');
 script_summary(english: 'Utempter symlink vulnerability');
 exit(0);
}

include('qpkg.inc');
if (qpkg_check(package: "sys-apps/utempter", unaffected: make_list("ge 0.5.5.4"), vulnerable: make_list("lt 0.5.5.4")
)) { security_warning(0); exit(0); }