How to Buy
This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-201206-26
(RPM: Multiple vulnerabilities)
Multiple vulnerabilities have been found in RPM:
fsm.c fails to properly strip setuid and setgid bits from executable
files during a package upgrade (CVE-2010-2059).
RPM does not properly parse spec files (CVE-2010-2197).
fsm.c fails to properly strip POSIX file capabilities from executable
files during a package upgrade or removal (CVE-2010-2198).
fsm.c fails to properly strip POSIX ACLs from executable files during
a package upgrade or removal (CVE-2010-2199).
header.c does not properly parse region offsets in package files
RPM does not properly sanitize region tags in package headers
RPM does not properly sanitize region sizes in package headers
RPM does not properly sanitize region offsets in package
A local attacker may be able to gain elevated privileges. Furthermore, a
remote attacker could entice a user to open a specially crafted RPM
package, possibly resulting in execution of arbitrary code with the
privileges of the process or a Denial of Service condition.
There is no known workaround at this time.
See also :
All RPM users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-arch/rpm-126.96.36.199'
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false
Family: Gentoo Local Security Checks
Nessus Plugin ID: 59679 ()
Bugtraq ID: 405124979952865
CVE ID: CVE-2010-2059CVE-2010-2197CVE-2010-2198CVE-2010-2199CVE-2011-3378CVE-2012-0060CVE-2012-0061CVE-2012-0815
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.