Mandrake Linux Security Advisory : mono (MDKSA-2006:188)

Medium Nessus Plugin ID 24573


The remote Mandrake Linux host is missing one or more security updates.


Sebastian Krahmer of the SUSE security team found that the System.CodeDom.Compiler classes in mono used temporary files in an insecure way that could allow a symbolic link attack to overwrite arbitrary files with the privileges of the user running a program that made use of those classes.

Updated packages have been patched to correct this issue.


Update the affected packages.

Plugin Details

Severity: Medium

ID: 24573

File Name: mandrake_MDKSA-2006-188.nasl

Version: $Revision: 1.14 $

Type: local

Published: 2007/02/18

Modified: 2015/03/19

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.2

Temporal Score: 5.4

Vector: CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:ND

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:jay, p-cpe:/a:mandriva:linux:lib64mono0, p-cpe:/a:mandriva:linux:lib64mono0-devel, p-cpe:/a:mandriva:linux:libmono-runtime, p-cpe:/a:mandriva:linux:libmono0, p-cpe:/a:mandriva:linux:libmono0-devel, p-cpe:/a:mandriva:linux:mono, p-cpe:/a:mandriva:linux:mono-data-sqlite, p-cpe:/a:mandriva:linux:mono-doc, cpe:/o:mandriva:linux:2007

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2006/10/27

Reference Information

CVE: CVE-2006-5072

BID: 20340

MDKSA: 2006:188