This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.
The remote Mandrake Linux host is missing one or more security
Jeroen van Wolffelaar discovered that the rmtree() function in the
perl File::Path module would remove directories in an insecure manner
which could lead to the removal of arbitrary files and directories via
a symlink attack (CVE-2004-0452).
Trustix developers discovered several insecure uses of temporary files
in many modules which could allow a local attacker to overwrite files
via symlink attacks (CVE-2004-0976).
'KF' discovered two vulnerabilities involving setuid-enabled perl
scripts. By setting the PERLIO_DEBUG environment variable and calling
an arbitrary setuid-root perl script, an attacker could overwrite
arbitrary files with perl debug messages (CVE-2005-0155). As well,
calling a setuid-root perl script with a very long path would cause a
buffer overflow if PERLIO_DEBUG was set, which could be exploited to
execute arbitrary files with root privileges (CVE-2005-0156).
The provided packages have been patched to resolve these problems.
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 4.6
Public Exploit Available : true
Family: Mandriva Local Security Checks
Nessus Plugin ID: 16360 (mandrake_MDKSA-2005-031.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now