Scientific Linux Security Update : python-paste-script on SL6.x i386/x86_64 (20120827)

medium Nessus Plugin ID 61694

Synopsis

The remote Scientific Linux host is missing a security update.

Description

Python Paste provides middleware for building and running Python web applications. The python-paste-script package includes paster, a tool for working with and running Python Paste applications.

It was discovered that paster did not drop supplementary group privileges when started by the root user. Running 'paster serve' as root to start a Python web application that will run as a non-root user and group resulted in that application running with root group privileges. This could possibly allow a remote attacker to gain access to files that should not be accessible to the application.
(CVE-2012-0878)

All paster users should upgrade to this updated package, which contains a backported patch to resolve this issue. All running paster instances configured to drop privileges must be restarted for this update to take effect.

Solution

Update the affected python-paste-script package.

See Also

http://www.nessus.org/u?2bbe8b35

Plugin Details

Severity: Medium

ID: 61694

File Name: sl_20120827_python_paste_script_on_SL6_x.nasl

Version: 1.5

Type: local

Agent: unix

Published: 8/28/2012

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:python-paste-script, x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 8/27/2012

Vulnerability Publication Date: 5/1/2012

Reference Information

CVE: CVE-2012-0878