![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.67230 |
Categoría: | Mandrake Local Security Checks |
Título: | Mandriva Security Advisory MDVSA-2010:074 (kdebase) |
Resumen: | NOSUMMARY |
Descripción: | Description: The remote host is missing an update to kdebase announced via advisory MDVSA-2010:074. A vulnerability has been found and corrected in kdm (kdebase/kdebase4-workspace): KDM contains a race condition that allows local attackers to make arbitrary files on the system world-writeable. This can happen while KDM tries to create its control socket during user login. This vulnerability has been discovered by Sebastian Krahmer from the SUSE Security Team (CVE-2010-0436). It is adviced to reboot the computer after applying the updated packages in order to the security fix to take full effect. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct this issue. Affected: 2008.0, 2009.1, 2010.0, Corporate 4.0 Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2010:074 http://www.kde.org/info/security/advisory-20100413-1.txt Risk factor : High CVSS Score: 6.9 |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2010-0436 39419 http://secunia.com/advisories/39419 39467 http://www.securityfocus.com/bid/39467 39481 http://secunia.com/advisories/39481 39506 http://secunia.com/advisories/39506 ADV-2010-0879 http://www.vupen.com/english/advisories/2010/0879 DSA-2037 http://www.debian.org/security/2010/dsa-2037 FEDORA-2010-6605 http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039533.html RHSA-2010:0348 http://rhn.redhat.com/errata/RHSA-2010-0348.html SUSE-SR:2010:009 http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html ftp://ftp.kde.org/pub/kde/security_patches/kdebase-workspace-4.3.5-CVE-2010-0436.diff http://www.kde.org/info/security/advisory-20100413-1.txt https://bugzilla.redhat.com/show_bug.cgi?id=570613 kde-kdm-privilege-escalation(57823) https://exchange.xforce.ibmcloud.com/vulnerabilities/57823 oval:org.mitre.oval:def:9999 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9999 |
Copyright | Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |