Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2005:089: cdrdao


Vulnerability Assessment Details

MDKSA-2005:089: cdrdao

Vulnerability Assessment Summary
Check for the version of the cdrdao package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2005:089 (cdrdao).



The cdrdao package contains two vulnerabilities
the first permits local users
to read arbitrary files via the show-data command and the second permits local
users to overwrite arbitrary files via a symlink attack on the ~/.cdrdao
configuration file. This can also lead to elevated rights (a root shell)
due to cdrdao being installed suid root.

The provided packages have been patched to correct these issues.



Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:089
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Vintage (New in Box)--AOpen Beige/White PS/2 Desktop Keyboard--KB-850P 90.00007
$9.99
Vintage (New in Box)--AOpen Beige/White PS/2 Desktop Keyboard--KB-850P 90.00007 pictureVintage Apple Computer Power Mac G4 Pro Create Poster MINT -
$36.0
Vintage Apple Computer Power Mac G4 Pro Create Poster MINT -  pictureIBM ValuePoint 6384 ISA Vintage Retro Internal Riser Expansion Card P/N: 81F8872
$39.0
IBM ValuePoint 6384 ISA Vintage Retro Internal Riser Expansion Card P/N: 81F8872 pictureVintage Apple Computer "Toasted Bunny" Poster 1998 -
$149.95
Vintage Apple Computer


Discussions

No Discussions have been posted on this vulnerability.