FreeBSD : ansible -- local symlink exploits (a6a9f9d5-205c-11e5-a4a5-002590263bf5)

This script is Copyright (C) 2015 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

MITRE reports :

runner/connection_plugins/ in Ansible before 1.2.3, when using
ControlPersist, allows local users to redirect a ssh session via a
symlink attack on a socket file with a predictable name in /tmp/.

lib/ansible/playbook/ in Ansible 1.2.x before 1.2.3, when
playbook does not run due to an error, allows local users to overwrite
arbitrary files via a symlink attack on a retry file with a
predictable name in /var/tmp/ansible/.

See also :!topic/ansible-project/UVDYW0HGcNg

Solution :

Update the affected package.

Risk factor :

Low / CVSS Base Score : 3.3

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 84527 ()

Bugtraq ID:

CVE ID: CVE-2013-4259

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now