FreeBSD : ansible -- local symlink exploits (a6a9f9d5-205c-11e5-a4a5-002590263bf5)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

MITRE reports :

runner/connection_plugins/ssh.py in Ansible before 1.2.3, when using
ControlPersist, allows local users to redirect a ssh session via a
symlink attack on a socket file with a predictable name in /tmp/.

lib/ansible/playbook/__init__.py in Ansible 1.2.x before 1.2.3, when
playbook does not run due to an error, allows local users to overwrite
arbitrary files via a symlink attack on a retry file with a
predictable name in /var/tmp/ansible/.

See also :

http://www.ansible.com/security
https://groups.google.com/forum/#!topic/ansible-project/UVDYW0HGcNg
http://www.nessus.org/u?8b7ed16b

Solution :

Update the affected package.

Risk factor :

Low / CVSS Base Score : 3.3
(CVSS2#AV:L/AC:M/Au:N/C:N/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 84527 ()

Bugtraq ID:

CVE ID: CVE-2013-4259
CVE-2013-4260

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now