Executive Summary
Summary | |
---|---|
Title | New semi, wemi packages fix insecure temporary file creation |
Informations | |||
---|---|---|---|
Name | DSA-339 | First vendor Publication | 2003-07-06 |
Vendor | Debian | Last vendor Modification | 2003-07-06 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 4.6 | Attack Range | Local |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
NOTE: due to a combination of administrative problems, this advisory was erroneously released with the identifier "DSA-337-1". DSA-337-1 correctly refers to an earlier advisory regarding gtksee. semi, a MIME library for GNU Emacs, does not take appropriate security precautions when creating temporary files. This bug could potentially be exploited to overwrite arbitrary files with the privileges of the user running Emacs and semi, potentially with contents supplied by the attacker. wemi is a fork of semi, and contains the same bug. For the stable distribution (woody) this problem has been fixed in semi version 1.14.3.cvs.2001.08.10-1woody2 and wemi version 1.14.0.20010802wemiko-1.3. For the unstable distribution (sid) this problem has been fixed in semi version 1.14.5+20030609-1. The unstable distribution does not contain a wemi package. We recommend that you update your semi and wemi packages. |
Original Source
Url : http://www.debian.org/security/2003/dsa-339 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:569 | |||
Oval ID: | oval:org.mitre.oval:def:569 | ||
Title: | Symlink Attack Vulnerability in semi/wemi MIME Libraries | ||
Description: | The (1) semi MIME library 1.14.5 and earlier, and (2) wemi 1.14.0 and possibly other versions, allows local users to overwrite arbitrary files via a symlink attack on temporary files. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0440 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | semi MIME library |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Os | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 337-1 (semi, wemi) File : nvt/deb_337_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 339-1 (semi, wemi) File : nvt/deb_339_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
12015 | semi/wemi MIME Library Symlink Arbitrary File Overwrite |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-339.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2003-231.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:32:44 |
|
2013-05-11 12:18:16 |
|