int(3535)

Vulnerability Bulletins


Truncado de archivos en xen-utils

Vulnerability classification

Property Value
Confidence level Oficial
Impact Integridad
Dificulty Experto
Required attacker level Acceso remoto con cuenta

System information

Property Value
Affected manufacturer GNU/Linux
Affected software xen-utils

Description

Se ha encontrado una vulnerabilidad en xen-utils. La vulnerabilidad reside en el uso de archivos temporales de forma insegura con la herramienta xenmon.

Un atacante local podría truncar archivos de forma arbitraria.

Solution



Actualización de software

Debian (DSA 1395-1)

Debian Linux 4.0
Source
http://security.debian.org/pool/updates/main/x/xen-3.0/xen-3.0_3.0.3-0.orig.tar.gz
http://security.debian.org/pool/updates/main/x/xen-3.0/xen-3.0_3.0.3-0-4.dsc
http://security.debian.org/pool/updates/main/x/xen-3.0/xen-3.0_3.0.3-0-4.diff.gz
Architecture independent
http://security.debian.org/pool/updates/main/x/xen-3.0/xen-docs-3.0_3.0.3-0-4_all.deb
amd64
http://security.debian.org/pool/updates/main/x/xen-3.0/xen-utils-3.0.3-1_3.0.3-0-4_amd64.deb
http://security.debian.org/pool/updates/main/x/xen-3.0/xen-hypervisor-3.0.3-1-amd64_3.0.3-0-4_amd64.deb
http://security.debian.org/pool/updates/main/x/xen-3.0/xen-ioemu-3.0.3-1_3.0.3-0-4_amd64.deb
i386
http://security.debian.org/pool/updates/main/x/xen-3.0/xen-utils-3.0.3-1_3.0.3-0-4_i386.deb
http://security.debian.org/pool/updates/main/x/xen-3.0/xen-hypervisor-3.0.3-1-i386_3.0.3-0-4_i386.deb
http://security.debian.org/pool/updates/main/x/xen-3.0/xen-hypervisor-3.0.3-1-i386-pae_3.0.3-0-4_i386.deb
http://security.debian.org/pool/updates/main/x/xen-3.0/xen-ioemu-3.0.3-1_3.0.3-0-4_i386.deb

Mandriva (MDKSA-2007:203)

Mandriva Linux 2007
X86
2007.0/i586/xen-3.0.3-0.20060703.3.1mdv2007.0.i586.rpm
2007.0/SRPMS/xen-3.0.3-0.20060703.3.1mdv2007.0.src.rpm
X86_64
2007.0/x86_64/xen-3.0.3-0.20060703.3.1mdv2007.0.x86_64.rpm
2007.0/SRPMS/xen-3.0.3-0.20060703.3.1mdv2007.0.src.rpm

Corporate Server 4.0
X86
corporate/4.0/i586/xen-3.0.1-3.1.20060mlcs4.i586.rpm
corporate/4.0/SRPMS/xen-3.0.1-3.1.20060mlcs4.src.rpm
X86_64
corporate/4.0/x86_64/xen-3.0.1-3.1.20060mlcs4.x86_64.rpm
corporate/4.0/SRPMS/xen-3.0.1-3.1.20060mlcs4.src.rpm

Mandriva Linux 2007.1
X86
2007.1/i586/xen-3.0.3-0.20060703.5.1mdv2007.1.i586.rpm
2007.1/SRPMS/xen-3.0.3-0.20060703.5.1mdv2007.1.src.rpm
X86_64
2007.1/x86_64/xen-3.0.3-0.20060703.5.1mdv2007.1.x86_64.rpm
2007.1/SRPMS/xen-3.0.3-0.20060703.5.1mdv2007.1.src.rpm

Red Hat (RHSA-2008:0194-20)
RHEL Desktop Multi OS (v. 5 cliente)
RHEL Virtualization (v. 5 servidor)
Red Hat Enterprise Linux (v. 5 servidor)
Red Hat Enterprise Linux Desktop (v. 5 cliente)
https://rhn.redhat.com/

Standar resources

Property Value
CVE CVE-2007-3919
BID 26190

Other resources

Debian Security Advisory (DSA 1395-1)
http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00172.html

Mandriva Security Advisory (MDKSA-2007:203)
http://www.mandriva.com/security/advisories?name=MDKSA-2007:203

Red Hat Security Advisory (RHSA-2008:0194-20)
http://rhn.redhat.com/errata/RHSA-2008-0194.html

Version history

Version Comments Date
1.0 Aviso emitido 2007-10-29
1.1 Aviso emitido por Mandriva (MDKSA-2007:203) 2007-11-07
1.2 Aviso emitido por Red Hat (RHSA-2008:0194-20), BID añadido, XF añadido 2008-05-14
Ministerio de Defensa
CNI
CCN
CCN-CERT