|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200611-17] fvwm: fvwm-menu-directory fvwm command injection Vulnerability Scan
Vulnerability Scan Summary fvwm: fvwm-menu-directory fvwm command injection
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200611-17
(fvwm: fvwm-menu-directory fvwm command injection)
Tavis Ormandy of the Gentoo Linux Security Audit Team discovered that
fvwm-menu-directory does not sufficiently sanitise directory names
prior to generating menus.
Impact
A local attacker who can convince an fvwm-menu-directory user to browse
a directory they control could cause fvwm commands to be executed with
the rights of the fvwm user. Fvwm commands can be used to execute
arbitrary shell commands.
Workaround
There is no known workaround at this time.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5969
Solution:
All fvwm users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=x11-wm/fvwm-2.5.18-r1"
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.
|