Executive Summary
Summary | |
---|---|
Title | New smstools packages fix format string vulnerability |
Informations | |||
---|---|---|---|
Name | DSA-930 | First vendor Publication | 2006-01-09 |
Vendor | Debian | Last vendor Modification | 2006-01-10 |
Severity (Vendor) | N/A | Revision | 2 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 4.6 | Attack Range | Local |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Ulf Harnhammar from the Debian Security Audit project discovered a format string attack in the logging code of smstools, which may be exploited to execute arbitary code with root privileges. The original advisory for this issue said that the old stable distribution (woody) was not affected because it did not contain smstools. This was incorrect, and the only change in this updated advisory is the inclusion of corrected packages for woody. For the old stable distribution (woody) this problem has been fixed in version 1.5.0-2woody0. For the stable distribution (sarge) this problem has been fixed in version 1.14.8-1sarge0. For the unstable distribution the package will be updated shortly. We recommend that you upgrade your smstools package. |
Original Source
Url : http://www.debian.org/security/2006/dsa-930 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 930-2 (smstools) File : nvt/deb_930_2.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
22287 | SMS Server Tools Logging Function Local Format String SMS Server Tools contains a flaw that may allow a malicious user to execute arbitrary code. The issue is triggered by the logging of malicious user input in some error messages. It is possible that the flaw may allow arbitrary code execution with increased privileges resulting in a loss of integrity. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-930.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:34:46 |
|