Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.880497
Kategorie:CentOS Local Security Checks
Titel:CentOS Update for luci CESA-2011:0394 centos5 i386
Zusammenfassung:The remote host is missing an update for the 'luci'; package(s) announced via the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'luci'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The conga packages provide a web-based administration tool for remote
cluster and storage management.

A privilege escalation flaw was found in luci, the Conga web-based
administration application. A remote attacker could possibly use this flaw
to obtain administrative access, allowing them to read, create, or modify
the content of the luci application. (CVE-2011-0720)

Users of Conga are advised to upgrade to these updated packages, which
contain a backported patch to resolve this issue. After installing the
updated packages, luci must be restarted ('service luci restart') for the
update to take effect.

Affected Software/OS:
luci on CentOS 5

Solution:
Please install the updated packages.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2011-0720
BugTraq ID: 46102
http://www.securityfocus.com/bid/46102
http://osvdb.org/70753
http://www.redhat.com/support/errata/RHSA-2011-0393.html
http://www.redhat.com/support/errata/RHSA-2011-0394.html
http://www.securitytracker.com/id?1025258
http://secunia.com/advisories/43146
http://secunia.com/advisories/43914
http://www.vupen.com/english/advisories/2011/0796
XForce ISS Database: plone-unspec-priv-escalation(65099)
https://exchange.xforce.ibmcloud.com/vulnerabilities/65099
CopyrightCopyright (C) 2011 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.