![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.881618 |
Kategorie: | CentOS Local Security Checks |
Titel: | CentOS Update for dbus-glib CESA-2013:0568 centos5 |
Zusammenfassung: | The remote host is missing an update for the 'dbus-glib'; package(s) announced via the referenced advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'dbus-glib' package(s) announced via the referenced advisory. Vulnerability Insight: dbus-glib is an add-on library to integrate the standard D-Bus library with the GLib main loop and threading model. A flaw was found in the way dbus-glib filtered the message sender (message source subject) when the signal was received. This could trick a system service using dbus-glib (such as fprintd) into believing a signal was sent from a privileged process, when it was not. A local attacker could use this flaw to escalate their privileges. (CVE-2013-0292) All dbus-glib users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications linked against dbus-glib, such as fprintd and NetworkManager, must be restarted for this update to take effect. Affected Software/OS: dbus-glib on CentOS 5 Solution: Please install the updated packages. CVSS Score: 7.2 CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-0292 33614 http://www.exploit-db.com/exploits/33614 52225 http://secunia.com/advisories/52225 52375 http://secunia.com/advisories/52375 52404 http://secunia.com/advisories/52404 57985 http://www.securityfocus.com/bid/57985 90302 http://osvdb.org/90302 MDVSA-2013:071 http://www.mandriva.com/security/advisories?name=MDVSA-2013:071 RHSA-2013:0568 http://rhn.redhat.com/errata/RHSA-2013-0568.html USN-1753-1 http://www.ubuntu.com/usn/USN-1753-1 [oss-security] 20130215 CVE-2013-0292: authentication bypass due to insufficient checks in dbus-glib < 0.100.1 http://www.openwall.com/lists/oss-security/2013/02/15/10 dbus-message-sender-priv-esc(82135) https://exchange.xforce.ibmcloud.com/vulnerabilities/82135 http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=911658 http://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html https://bugs.freedesktop.org/show_bug.cgi?id=60916 |
Copyright | Copyright (C) 2013 Greenbone AG |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |