GLSA-201006-10 : multipath-tools: World-writeable socket

This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.

Synopsis :

The remote Gentoo host is missing one or more security-related

Description :

The remote host is affected by the vulnerability described in GLSA-201006-10
(multipath-tools: World-writeable socket)

multipath-tools uses world-writable permissions for the socket file

Impact :

Local users could send arbitrary commands to the multipath daemon,
causing cluster failures and data loss.

Workaround :

chmod o-rwx /var/run/multipath.sock

See also :

Solution :

All multipath-tools users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=sys-fs/multipath-tools-0.4.8-r1'
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since November 13, 2009. It is likely that your system is
already no longer affected by this issue.

Risk factor :

High / CVSS Base Score : 7.2
CVSS Temporal Score : 7.2
Public Exploit Available : false

Family: Gentoo Local Security Checks

Nessus Plugin ID: 46777 (gentoo_GLSA-201006-10.nasl)

Bugtraq ID: 34410

CVE ID: CVE-2009-0115

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now