Scientific Linux Security Update : gdm on SL5.x i386/srpm/x86_64 (20130905)

medium Nessus Plugin ID 69796

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

A race condition was found in the way GDM handled the X server sockets directory located in the system temporary directory. An unprivileged user could use this flaw to perform a symbolic link attack, giving them write access to any file, allowing them to escalate their privileges to root. (CVE-2013-4169)

Note that this erratum includes an updated initscripts package. To fix CVE-2013-4169, the vulnerable code was removed from GDM and the initscripts package was modified to create the affected directory safely during the system boot process. Therefore, this update will appear on all systems, however systems without GDM installed are not affected by this flaw.

The system must be rebooted for this update to take effect.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?70f85771

Plugin Details

Severity: Medium

ID: 69796

File Name: sl_20130905_gdm_on_SL5_x.nasl

Version: 1.10

Type: local

Agent: unix

Published: 9/6/2013

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:gdm, p-cpe:/a:fermilab:scientific_linux:gdm-debuginfo, p-cpe:/a:fermilab:scientific_linux:gdm-docs, p-cpe:/a:fermilab:scientific_linux:initscripts, p-cpe:/a:fermilab:scientific_linux:initscripts-debuginfo, x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 9/5/2013

Vulnerability Publication Date: 9/10/2013

Reference Information

CVE: CVE-2013-4169