Executive Summary
Summary | |
---|---|
Title | New ganeti packages fix arbitrary command execution |
Informations | |||
---|---|---|---|
Name | DSA-1959 | First vendor Publication | 2009-12-19 |
Vendor | Debian | Last vendor Modification | 2009-12-19 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
It was discovered that ganeti, a virtual server cluster manager, does not validate the path of scripts passed as arguments to certain commands, which allows local or remote users (via the web interface in versions 2.x) to execute arbitrary commands on a host acting as a cluster master. For the stable distribution (lenny), this problem has been fixed in version 1.2.6-3+lenny2. For the testing distribution (squeeze), this problem will be fixed in version 2.0.5-1. For the unstable distribution (sid), this problem has been fixed in version 2.0.5-1. The oldstable distribution (etch) does not include ganeti. We recommend that you upgrade your ganeti packages. |
Original Source
Url : http://www.debian.org/security/2009/dsa-1959 |
Alert History
Date | Informations |
---|---|
2016-04-26 21:41:31 |
|
2014-02-17 11:29:06 |
|
2013-05-11 00:43:38 |
|