RHEL 2.1 : mm (RHSA-2002:154)

This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated mm packages are now available for Red Hat Linux Advanced
Server. This update addresses possible vulnerabilities in how the MM
library opens temporary files.

The MM library provides an abstraction layer which allows related
processes to easily share data. On systems where shared memory or
other inter-process communication mechanisms are not available, the MM
library will emulate them using temporary files. MM is used in Red Hat
Linux to providing shared memory pools to Apache modules.

Versions of MM up to and including 1.1.3 open temporary files in an
unsafe manner, allowing a malicious local user to cause an application
which uses MM to overwrite any file to which it has write access.

All users are advised to upgrade to these errata packages which
contain a patched version of MM that is not vulnerable to this issue.

Thanks to Marcus Meissner for providing a patch for this issue.

See also :

https://www.redhat.com/security/data/cve/CVE-2002-0658.html
http://www.engelschall.com/sw/mm/
http://rhn.redhat.com/errata/RHSA-2002-154.html

Solution :

Update the affected mm and / or mm-devel packages.

Risk factor :

Medium / CVSS Base Score : 6.2
(CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 12314 ()

Bugtraq ID:

CVE ID: CVE-2002-0658