RHEL 2.1 : mm (RHSA-2002:154)

This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated mm packages are now available for Red Hat Linux Advanced
Server. This update addresses possible vulnerabilities in how the MM
library opens temporary files.

The MM library provides an abstraction layer which allows related
processes to easily share data. On systems where shared memory or
other inter-process communication mechanisms are not available, the MM
library will emulate them using temporary files. MM is used in Red Hat
Linux to providing shared memory pools to Apache modules.

Versions of MM up to and including 1.1.3 open temporary files in an
unsafe manner, allowing a malicious local user to cause an application
which uses MM to overwrite any file to which it has write access.

All users are advised to upgrade to these errata packages which
contain a patched version of MM that is not vulnerable to this issue.

Thanks to Marcus Meissner for providing a patch for this issue.

See also :

https://www.redhat.com/security/data/cve/CVE-2002-0658.html
http://www.engelschall.com/sw/mm/
http://rhn.redhat.com/errata/RHSA-2002-154.html

Solution :

Update the affected mm and / or mm-devel packages.

Risk factor :

Medium / CVSS Base Score : 6.2
(CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 12314 ()

Bugtraq ID:

CVE ID: CVE-2002-0658

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial