Family: Mandrake Local Security Checks --> Category: infos
MDKSA-2004:031-1: utempter Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the utempter package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory MDKSA-2004:031-1 (utempter).
Steve Grubb discovered two potential issues in the utempter program:
1) If the path to the device contained /../ or /./ or //, the program was not
exiting as it should. It would be possible to use something like
/dev/../tmp/tty0, and then if /tmp/tty0 were deleted and symlinked to another
important file, programs that have root rights that do no further validation
can then overwrite whatever the symlink pointed to. 2) Several calls to strncpy
without a manual termination of the string. This would most likely crash
The updated packages are patched to correct these problems.
The second portion of the patch to address the manual termination of the string
has been acertaind to be uneccessary, as well as reducing the length of utmp
strings by one character. As such, it has been removed.
Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2004:031-1
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.