Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2005:079: perl


Vulnerability Assessment Details

MDKSA-2005:079: perl

Vulnerability Assessment Summary
Check for the version of the perl package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2005:079 (perl).



Paul Szabo discovered another vulnerability in the rmtree() function in
File::Path.pm. While a process running as root (or another user) was busy
deleting a directory tree, a different user could exploit a race condition to
create setuid binaries in this directory tree, provided that he already had
write permissions in any subdirectory of that tree.

The provided packages have been patched to resolve this problem.



Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:079
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

IBM SYSTEM X3250 M5 SERVER 24GB NO HDD 1
$1179.0
IBM SYSTEM X3250 M5 SERVER 24GB NO HDD 1 pictureIBM SYSTEM X3650 M3 8B SERVER TWO E5640 2.66GHZ 16GB NO HDD
$819.0
IBM SYSTEM X3650 M3 8B SERVER TWO E5640 2.66GHZ 16GB NO HDD pictureIBM SYSTEM X3550 M3 SERVER TWO E5520 2.26GHZ 96GB 2 X 250GB SATA
$829.0
IBM SYSTEM X3550 M3 SERVER TWO E5520 2.26GHZ 96GB 2 X 250GB SATA pictureIBM SYSTEM X3550 M3 SERVER TWO E5640 2.66GHZ 48GB 4 X 1.2TB 10K SAS
$1919.0
IBM SYSTEM X3550 M3 SERVER TWO E5640 2.66GHZ 48GB 4 X 1.2TB 10K SAS picture


Discussions

No Discussions have been posted on this vulnerability.