Executive Summary

Summary
TitleNew gforge packages fix denial of service
Informations
NameDSA-1945First vendor Publication2009-12-03
VendorDebianLast vendor Modification2009-12-03
Severity (Vendor) N/ARevision1

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:M/Au:N/C:N/I:P/A:P)
Cvss Base Score3.3Attack RangeLocal
Cvss Impact Score4.9Attack ComplexityMedium
Cvss Expoit Score3.4AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Sylvain Beucler discovered that gforge, a collaborative development tool, is prone to a symlink attack, which allows local users to perform a denial of service attack by overwriting arbitrary files.



For the stable distribution (lenny), this problem has been fixed in version 4.7~rc2-7lenny3.

The oldstable distribution (etch), this problem has been fixed in version 4.5.14-22etch13.

For the testing distribution (squeeze), this problem will be fixed soon.

For the unstable distribution (sid), this problem has been fixed in version 4.8.2-1.



We recommend that you upgrade your gforge packages.

Original Source

Url : http://www.debian.org/security/2009/dsa-1945

CWE : Common Weakness Enumeration

idName
CWE-59Improper Link Resolution Before File Access ('Link Following')

CPE : Common Platform Enumeration

TypeDescriptionCount
Application3

OpenVAS Exploits

DateDescription
2009-12-10Name : Debian Security Advisory DSA 1945-1 (gforge)
File : nvt/deb_1945_1.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
60656Gforge Unspecified Symlink Arbitrary File Overwrite

Nessus® Vulnerability Scanner

DateDescription
2010-02-24Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1945.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2014-02-17 11:29:03
  • Multiple Updates