Executive Summary
Summary | |
---|---|
Title | New gopher packages fix insecure temporary file creation |
Informations | |||
---|---|---|---|
Name | DSA-770 | First vendor Publication | 2005-07-29 |
Vendor | Debian | Last vendor Modification | 2005-07-29 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
John Goerzen discovered that gopher, a client for the Gopher Distributed Hypertext protocol, creates temporary files in an insecure fashion. For the old stable distribution (woody) this problem has been fixed in version 3.0.3woody3. For the stable distribution (sarge) this problem has been fixed in version 3.0.7sarge1. For the unstable distribution (sid) this problem has been fixed in version 3.0.9. We recommend that you upgrade your gopher package. |
Original Source
Url : http://www.debian.org/security/2005/dsa-770 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 770-1 (gopher) File : nvt/deb_770_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
18390 | Multiple Gopher Client Insecure Temporary File Creation Privilege Escalation Gopher contains a flaw that may allow a malicious local user to overwrite or create arbitrary files on the system. The issue is due to routines in the 'gopher.c' file creating temporary files insecurely in the /tmp folder. It is possible for a user to use a symlink style attack to manipulate arbitrary files, resulting in a loss of integrity. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-01-12 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-773.nasl - Type : ACT_GATHER_INFO |
2005-07-31 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-770.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:34:12 |
|