Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200510-13] SPE: Insecure file permissions


Vulnerability Assessment Details

[GLSA-200510-13] SPE: Insecure file permissions

Vulnerability Assessment Summary
SPE: Insecure file permissions

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200510-13
(SPE: Insecure file permissions)


It was reported that due to an oversight all SPE's files are set
as world-writeable.

Impact

A local attacker could modify the executable files, causing
arbitrary code to be executed with the permissions of the user running
SPE.

Workaround

There is no known workaround at this time.


Solution:
All SPE users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose dev-util/spe


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors

Samsung RV420 14" Core i3 2310M - 2 GB RAM - 320 GB HDD
$25.0
Samsung RV420 14Samsung 2GB 2X1G PC2700 DDR 333MHz Sodimm Laptop Memory 200PIN RAM Non Ecc CL2.5
$7.25
Samsung 2GB 2X1G PC2700 DDR 333MHz Sodimm Laptop Memory 200PIN RAM Non Ecc CL2.5 pictureHynix 2GB 2X1GB PC2700 DDR 333MHz Sodimm Laptop Memory 200PINS RAM Non Ecc CL2.5
$7.25
Hynix 2GB 2X1GB PC2700 DDR 333MHz Sodimm Laptop Memory 200PINS RAM Non Ecc CL2.5 pictureDell Windows 7 Pro Desktop PC Computer 8Gb RAM 250Gb HDD DVD-RW HDMI WiFi
$159.0
Dell Windows 7 Pro Desktop PC Computer 8Gb RAM 250Gb HDD DVD-RW HDMI WiFi picture


Discussions

No Discussions have been posted on this vulnerability.