Executive Summary

Summary
Title New ekg packages fix several vulnerabilities
Informations
Name DSA-760 First vendor Publication 2005-07-18
Vendor Debian Last vendor Modification 2005-07-18
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Several vulnerabilities have been discovered in ekg, a console Gadu Gadu client, an instant messaging program. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities:

CAN-2005-1850

Marcin Owsiany and Wojtek Kaniewski discovered insecure temporary file creation in contributed scripts.

CAN-2005-1851

Marcin Owsiany and Wojtek Kaniewski discovered potential shell command injection in a contributed script.

CAN-2005-1916

Eric Romang discovered insecure temporary file creation and arbitrary command execution in a contributed script that can be exploited by a local attacker.

The old stable distribution (woody) does not contain an ekg package.

For the stable distribution (sarge) these problems have been fixed in version 1.5+20050411-4.

For the unstable distribution (sid) these problems have been fixed in version 1.5+20050712+1.6rc2-1.

We recommend that you upgrade your ekg package.

Original Source

Url : http://www.debian.org/security/2005/dsa-760

CAPEC : Common Attack Pattern Enumeration & Classification

Id Name
CAPEC-27 Leveraging Race Conditions via Symbolic Links

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-59 Improper Link Resolution Before File Access ('Link Following')

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 11
Os 1

OpenVAS Exploits

Date Description
2008-09-04 Name : FreeBSD Ports: gaim, ja-gaim, ko-gaim, ru-gaim
File : nvt/freebsd_gaim16.nasl
2008-09-04 Name : FreeBSD Ports: pl-ekg
File : nvt/freebsd_pl-ekg.nasl
2008-01-17 Name : Debian Security Advisory DSA 760-1 (ekg)
File : nvt/deb_760_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
18072 ekg Unspecified Contributed Script Insecure Temporary File Creation

18071 ekg Unspecified Contributed Script Arbitrary Command Execution

17722 ekg linki.py Add-on Symlink Arbitrary File Manipulation

Eksperymentalny Klient Gadu-Gadu (EKG) contains a flaw that may allow a malicious local user to overwrite or create arbitrary files on the system. The issue is due to the czyjest and handle_keypress() functions in the contrib/scripts/linki.py script creating temporary files insecurely. It is possible for a user to use a symlink style attack from a critical EKG file to the /tmp/rmrmg_ekg_url file. When EKG is run, the temporary symlink file is activated with the privileges of the user running EKG, resulting in a loss of integrity.

Nessus® Vulnerability Scanner

Date Description
2012-01-12 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-773.nasl - Type : ACT_GATHER_INFO
2006-05-13 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_3b4a69820b2411dabc080001020eed82.nasl - Type : ACT_GATHER_INFO
2006-01-15 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-162-1.nasl - Type : ACT_GATHER_INFO
2005-08-01 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_9a035a56eff011d983100001020eed82.nasl - Type : ACT_GATHER_INFO
2005-07-19 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-760.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:34:10
  • Multiple Updates