Debian DSA-636-1 : glibc - insecure temporary files

low Nessus Plugin ID 16150

Synopsis

The remote Debian host is missing a security-related update.

Description

Several insecure uses of temporary files have been discovered in support scripts in the libc6 package which provides the c library for a GNU/Linux system. Trustix developers found that the catchsegv script uses temporary files insecurely. Openwall developers discovered insecure temporary files in the glibcbug script. These scripts are vulnerable to a symlink attack.

Solution

Upgrade the libc6 package.

For the stable distribution (woody) these problems have been fixed in version 2.2.5-11.8.

See Also

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=279680

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278278

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=205600

http://www.debian.org/security/2005/dsa-636

Plugin Details

Severity: Low

ID: 16150

File Name: debian_DSA-636.nasl

Version: 1.20

Type: local

Agent: unix

Published: 1/13/2005

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.7

CVSS v2

Risk Factor: Low

Base Score: 2.1

Temporal Score: 1.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:3.0, p-cpe:/a:debian:debian_linux:glibc

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 1/12/2005

Vulnerability Publication Date: 10/22/2004

Reference Information

CVE: CVE-2004-0968, CVE-2004-1382

BID: 11286

DSA: 636