FreeBSD : ampache -- insecure temporary file usage (0ac68e68-d32b-11dd-b540-d1288664c17e)

This script is Copyright (C) 2008-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Secunia reports :

A security issue has been reported in Ampache, which can be exploited
by malicious, local users to perform certain actions with escalated
privileges.

The security issue is caused due to the 'gather-messages.sh' script
handling temporary files in an insecure manner. This can be exploited
via symlink attacks to overwrite arbitrary files with the privileges
of the user running the script.

See also :

http://www.nessus.org/u?984e8eba

Solution :

Update the affected package.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.0
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 35277 (freebsd_pkg_0ac68e68d32b11ddb540d1288664c17e.nasl)

Bugtraq ID: 30875

CVE ID: CVE-2008-3929

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now