Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Gentoo Local Security Checks --> Category: infos

[GLSA-200611-17] fvwm: fvwm-menu-directory fvwm command injection Vulnerability Scan


Vulnerability Scan Summary
fvwm: fvwm-menu-directory fvwm command injection

Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200611-17
(fvwm: fvwm-menu-directory fvwm command injection)


Tavis Ormandy of the Gentoo Linux Security Audit Team discovered that
fvwm-menu-directory does not sufficiently sanitise directory names
prior to generating menus.

Impact

A local attacker who can convince an fvwm-menu-directory user to browse
a directory they control could cause fvwm commands to be executed with
the rights of the fvwm user. Fvwm commands can be used to execute
arbitrary shell commands.

Workaround

There is no known workaround at this time.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5969


Solution:
All fvwm users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=x11-wm/fvwm-2.5.18-r1"


Threat Level: Medium


Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.