Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
These remote packages are missing security patches :
Javier Fernández-Sanguino Peña noticed that cdrecord created temporary
files in an insecure manner if DEBUG was enabled in
/etc/cdrecord/rscsi. If the default value was used (which stored the
debug output file in /tmp), this could permit a symbolic link attack to
create or overwrite arbitrary files with the rights of the user
Please note that DEBUG is not enabled by default in Ubuntu, so if you
did not explicitly enable it, this does not affect you.
Upgrade to :
- cdda2wav-2.0+a30.pre1-1ubuntu2.2 (Ubuntu 4.10)
- cdrecord-2.0+a30.pre1-1ubuntu2.2 (Ubuntu 4.10)
- cdrtools-doc-2.0+a30.pre1-1ubuntu2.2 (Ubuntu 4.10)
- mkisofs-2.0+a30.pre1-1ubuntu2.2 (Ubuntu 4.10)
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi
|Intel Core i7 SLBEJ CPU 2.66GHz/8M/4.80/08 Processor - Tested
|2Pcs Left Right CPU Cooling Fans for Apple MacBook Pro A1707 W/ Touch Bar
No Discussions have been posted on this vulnerability.