Vulnerability Bulletins |
Denegación de servicio en xmcd |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Denegación de Servicio |
Dificulty | Experto |
Required attacker level | Acceso remoto con cuenta |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software | xmcd |
Description |
|
Se ha descubierto una vulnerabilidad en xmcd. La vulnerabilidad reside en que xmcdconfig crea directorios con permiso de escritura para cualquier usuario. Un atacante local podría causar una denegación de servicio mediante el llenado de las particiones /usr y /var. |
|
Solution |
|
Actualización de software Debian Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-14woody1.dsc http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-14woody1.diff.gz http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/x/xmcd/cddb_2.6-14woody1_alpha.deb http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-14woody1_alpha.deb ARM http://security.debian.org/pool/updates/main/x/xmcd/cddb_2.6-14woody1_arm.deb http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-14woody1_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/x/xmcd/cddb_2.6-14woody1_i386.deb http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-14woody1_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/x/xmcd/cddb_2.6-14woody1_ia64.deb http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-14woody1_ia64.deb HP Precision http://security.debian.org/pool/updates/main/x/xmcd/cddb_2.6-14woody1_hppa.deb http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-14woody1_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/x/xmcd/cddb_2.6-14woody1_m68k.deb http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-14woody1_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/x/xmcd/cddb_2.6-14woody1_mips.deb http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-14woody1_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/x/xmcd/cddb_2.6-14woody1_mipsel.deb http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-14woody1_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/x/xmcd/cddb_2.6-14woody1_powerpc.deb http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-14woody1_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/x/xmcd/cddb_2.6-14woody1_s390.deb http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-14woody1_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/x/xmcd/cddb_2.6-14woody1_sparc.deb http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-14woody1_sparc.deb Debian Linux 3.1 Source http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-17sarge1.dsc http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-17sarge1.diff.gz http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/x/xmcd/cddb_2.6-17sarge1_alpha.deb http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-17sarge1_alpha.deb AMD64 http://security.debian.org/pool/updates/main/x/xmcd/cddb_2.6-17sarge1_amd64.deb http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-17sarge1_amd64.deb ARM http://security.debian.org/pool/updates/main/x/xmcd/cddb_2.6-17sarge1_arm.deb http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-17sarge1_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/x/xmcd/cddb_2.6-17sarge1_i386.deb http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-17sarge1_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/x/xmcd/cddb_2.6-17sarge1_ia64.deb http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-17sarge1_ia64.deb HP Precision http://security.debian.org/pool/updates/main/x/xmcd/cddb_2.6-17sarge1_hppa.deb http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-17sarge1_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/x/xmcd/cddb_2.6-17sarge1_m68k.deb http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-17sarge1_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/x/xmcd/cddb_2.6-17sarge1_mips.deb http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-17sarge1_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/x/xmcd/cddb_2.6-17sarge1_mipsel.deb http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-17sarge1_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/x/xmcd/cddb_2.6-17sarge1_powerpc.deb http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-17sarge1_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/x/xmcd/cddb_2.6-17sarge1_s390.deb http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-17sarge1_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/x/xmcd/cddb_2.6-17sarge1_sparc.deb http://security.debian.org/pool/updates/main/x/xmcd/xmcd_2.6-17sarge1_sparc.deb |
|
Standar resources |
|
Property | Value |
CVE | CVE-2006-2542 |
BID | |
Other resources |
|
Debian Security Advisory (DSA 1086-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00172.html |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2006-06-06 |