Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2009-1642

Опубликовано: 07 дек. 2009
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2009-1642: acpid security update (IMPORTANT)

[1.0.4-9.el5_4.1]

  • Resolves: #515062 CVE-2009-4033 acpid: log file created with random permissions

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

acpid

1.0.4-9.el5_4.1

Oracle Linux x86_64

acpid

1.0.4-9.el5_4.1

Oracle Linux i386

acpid

1.0.4-9.el5_4.1

Связанные CVE

Связанные уязвимости

ubuntu
больше 15 лет назад

A certain Red Hat patch for acpid 1.0.4 effectively triggers a call to the open function with insufficient arguments, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file, cause a denial of service by overwriting this file, or gain privileges by executing this file.

redhat
больше 15 лет назад

A certain Red Hat patch for acpid 1.0.4 effectively triggers a call to the open function with insufficient arguments, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file, cause a denial of service by overwriting this file, or gain privileges by executing this file.

nvd
больше 15 лет назад

A certain Red Hat patch for acpid 1.0.4 effectively triggers a call to the open function with insufficient arguments, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file, cause a denial of service by overwriting this file, or gain privileges by executing this file.

debian
больше 15 лет назад

A certain Red Hat patch for acpid 1.0.4 effectively triggers a call to ...

github
около 3 лет назад

A certain Red Hat patch for acpid 1.0.4 effectively triggers a call to the open function with insufficient arguments, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file, cause a denial of service by overwriting this file, or gain privileges by executing this file.