![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.54417 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 3 FEDORA-2005-600 (perl) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to perl announced via advisory FEDORA-2005-600. Paul Szabo discovered another vulnerability in the File::Path::rmtree function of perl, the popular scripting language. When a process is deleting a directory tree, a different user could exploit a race condition to create setuid binaries in this directory tree, provided that he already had write permissions in any subdirectory of that tree. Perl interpreter would cause a segmentation fault when environment changes during the runtime. Code in lib/FindBin contained a regression which caused problems with MRTG software package. Solution: Apply the appropriate updates. This update can be downloaded from: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ This update can also be installed with the Update Agent you can launch the Update Agent with the 'up2date' command. https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2005-600 Risk factor : Low CVSS Score: 1.2 |
Cross-Ref: |
BugTraq ID: 12767 Common Vulnerability Exposure (CVE) ID: CVE-2005-0448 http://www.securityfocus.com/bid/12767 Conectiva Linux advisory: CLSA-2006:1056 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056 Debian Security Information: DSA-696 (Google Search) http://www.debian.org/security/2005/dsa-696 http://fedoranews.org/updates/FEDORA--.shtml http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml HPdes Security Advisory: HPSBUX01208 http://www.securityfocus.com/advisories/8704 HPdes Security Advisory: SSRT5938 http://www.mandriva.com/security/advisories?name=MDKSA-2005:079 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10475 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A728 http://www.redhat.com/support/errata/RHSA-2005-674.html http://www.redhat.com/support/errata/RHSA-2005-881.html http://secunia.com/advisories/14531 http://secunia.com/advisories/17079 http://secunia.com/advisories/18075 http://secunia.com/advisories/18517 http://secunia.com/advisories/55314 SGI Security Advisory: 20060101-01-U ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U https://usn.ubuntu.com/94-1/ |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |