This script is Copyright (C) 2005-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
An updated perl-DBI package that fixes a temporary file flaw in
DBI::ProxyServer is now available for Red Hat Enterprise Linux 4.
This update has been rated as having low security impact by the Red
Hat Security Response Team.
DBI is a database access Application Programming Interface (API) for
the Perl programming language.
The Debian Security Audit Project discovered that the DBI library
creates a temporary PID file in an insecure manner. A local user could
overwrite or create files as a different user who happens to run an
application which uses DBI::ProxyServer. The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the name
CVE-2005-0077 to this issue.
Users should update to this erratum package which disables the
temporary PID file unless configured.
See also :
Update the affected perl-DBI package.
Risk factor :
Low / CVSS Base Score : 2.1
Family: Red Hat Local Security Checks
Nessus Plugin ID: 17180 ()
CVE ID: CVE-2005-0077
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.