Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200510-13] SPE: Insecure file permissions


Vulnerability Assessment Details

[GLSA-200510-13] SPE: Insecure file permissions

Vulnerability Assessment Summary
SPE: Insecure file permissions

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200510-13
(SPE: Insecure file permissions)


It was reported that due to an oversight all SPE's files are set
as world-writeable.

Impact

A local attacker could modify the executable files, causing
arbitrary code to be executed with the permissions of the user running
SPE.

Workaround

There is no known workaround at this time.


Solution:
All SPE users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose dev-util/spe


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors

Mainboard Fujitsu Siemens NIXDORF S26361-D Socket 1 and CPU Intel Pentium II + M
$90.0
Mainboard Fujitsu Siemens NIXDORF S26361-D Socket 1 and CPU Intel Pentium II + M pictureINTEL SR1AN E5-2620V2 2.1GHz 6-Core 15MB LGA2011 Ivy Bridge-EP Processor CPU
$16.99
INTEL SR1AN E5-2620V2 2.1GHz 6-Core 15MB LGA2011 Ivy Bridge-EP Processor CPU pictureDell Inspiron 15 3000 15.6" (Intel 4030 CPU 1.90GHz, 4 GB RAM, 500 GB HDD 64bit
$125.5
Dell Inspiron 15 3000 15.6Intel Core i7-7700 3.6GHz Quad Core 8MB Processor LGA1151 SR338 Tested Grade A
$219.99
Intel Core i7-7700 3.6GHz Quad Core 8MB Processor LGA1151 SR338 Tested Grade A picture


Discussions

No Discussions have been posted on this vulnerability.