Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2005:089: cdrdao


Vulnerability Assessment Details

MDKSA-2005:089: cdrdao

Vulnerability Assessment Summary
Check for the version of the cdrdao package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2005:089 (cdrdao).



The cdrdao package contains two vulnerabilities
the first permits local users
to read arbitrary files via the show-data command and the second permits local
users to overwrite arbitrary files via a symlink attack on the ~/.cdrdao
configuration file. This can also lead to elevated rights (a root shell)
due to cdrdao being installed suid root.

The provided packages have been patched to correct these issues.



Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:089
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Samsung New Original OEM Genuine JC73-00093A RMO-ROLLER HEAT
$38.88
Samsung New Original OEM Genuine JC73-00093A RMO-ROLLER HEAT  picture1 year + Pre Owned 512gb Samsung 850 Pro Solid State Drive SSD
$145.0
1 year + Pre Owned 512gb Samsung 850 Pro Solid State Drive SSD pictureSamsung MLT-D208S 208S Black Toner Cartridge
$29.99
Samsung MLT-D208S 208S Black Toner Cartridge pictureSamsung - 850 EVO 500GB Internal Serial ATA Solid State Drive for Laptops
$139.99
Samsung - 850 EVO 500GB Internal Serial ATA Solid State Drive for Laptops picture


Discussions

No Discussions have been posted on this vulnerability.