Executive Summary

Summary
Title Updated utempter package fixes vulnerability
Informations
Name RHSA-2004:174 First vendor Publication 2004-05-26
Vendor RedHat Last vendor Modification 2004-05-26
Severity (Vendor) N/A Revision 01

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:N/I:P/A:N)
Cvss Base Score 2.1 Attack Range Local
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Problem Description:

Original Source

Url : https://rhn.redhat.com/errata/RHSA-2004-174.html

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:10115
 
Oval ID: oval:org.mitre.oval:def:10115
Title: Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.
Description: Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0233
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:979
 
Oval ID: oval:org.mitre.oval:def:979
Title: Utempter Directory Traversal Vulnerability
Description: Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0233
Version: 1
Platform(s): Red Hat Enterprise Linux 3
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2
Application 2
Os 2

OpenVAS Exploits

Date Description
2008-09-24 Name : Gentoo Security Advisory GLSA 200405-05 (utempter)
File : nvt/glsa_200405_05.nasl
0000-00-00 Name : Slackware Advisory SSA:2004-110-01 utempter security update
File : nvt/esoft_slk_ssa_2004_110_01.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
5550 utempter Symlink Arbitrary File Overwrite

utempter contains a flaw that may allow a malicious user to overwrite arbitrary files. The issue is triggered when a path to a device contains "/../", "/./", or "//" characters. It is possible that the flaw may allow a malicious user to create symlink attacks and overwrite arbitrary files resulting in a loss of integrity.

Nessus® Vulnerability Scanner

Date Description
2005-07-13 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2004-110-01.nasl - Type : ACT_GATHER_INFO
2004-08-30 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200405-05.nasl - Type : ACT_GATHER_INFO
2004-07-31 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2004-031.nasl - Type : ACT_GATHER_INFO
2004-07-06 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2004-174.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:48:28
  • Multiple Updates