|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200701-28] thttpd: Unauthenticated remote file access Vulnerability Assessment Details
|
[GLSA-200701-28] thttpd: Unauthenticated remote file access |
||
thttpd: Unauthenticated remote file access Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200701-28 (thttpd: Unauthenticated remote file access) thttpd is vulnerable to an underlying change made to the start-stop-daemon command in the current stable Gentoo baselayout package (version 1.12.6). In the new version, the start-stop-daemon command performs a "chdir /" command just before starting the thttpd process. In the Gentoo default configuration, this causes thttpd to start with the document root set to "/", the sytem root directory. Impact When thttpd starts with the document root set to the system root directory, all files on the system that are readable by the thttpd process can be remotely accessed by unauthenticated users. Workaround Alter the THTTPD_OPTS variable in /etc/conf.d/thttpd to include the "-d" option to specify the document root. Alternatively, modify the THTTPD_OPTS variable in /etc/conf.d/thttpd to specify a thttpd.conf file using the "-C" option, and then configure the "dir=" directive in that thttpd.conf file. Solution: All thttpd users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-servers/thttpd-2.25b-r5" Network Security Threat Level: Low Networks Security ID: Vulnerability Assessment Copyright: (C) 2007 Michel Arboi |
||
Cables, Connectors |
HPGYT DELL 960GB SATA 6Gb/s 2.5in Internal SSD 0HPGYT MTFDDAK960TCB
$59.00
G5T03 Dell Intel DC S3700 Series 800GB SATA 6Gb/s 2.5" SSD 0G5T03 SSDSC2BA800G3E
$55.00
ACASIS 2.5/3.5 inch 2 Bay SATA USB 3.0 Hard Drive Disk HDD SSD Enclosure 4 RAID
$58.99
M.2 NVME SATA SSD Enclosure USB 3.2 Gen 2 10Gbps for M-Key or M+B Key SSD to 8TB
$40.86
Patriot P210 128GB 256GB 512GB 1TB 2TB 2.5" SATA 3 6GB/s Internal SSD PC/MAC Lot
$14.99
Micron 5100 MAX 120GB SATA 6Gb/s 2.5" Internal SSD MTFDDAK120TCC Solid State
$9.99
Intel DC S3510 Series 120GB SSD 2.5" 6Gb/s SATA Solid State Drive SSDSC2BB120G6K
$9.99
Netac 1TB 2TB 512GB Internal SSD 2.5'' SATA III 6Gb/s Solid State Drive lot
$13.99
Fanxiang SSD 512GB 1TB 2TB 4TB 2.5'' SSD SATA III Internal Solid State Drive lot
$198.99
Fanxiang 256GB 512GB 1TB 2TB 4TB Internal SSD 2.5" SATA III 6GB/s for PC/MAC Lot
$188.09
|
||
No Discussions have been posted on this vulnerability. |