Vulnerabilities > CVE-2005-3341 - Unspecified vulnerability in Dhis Tools DNS Package
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN dhis-tools
nessus
Summary
DHIS tools DNS package (dhis-tools-dns) before 5.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files created by (1) register-q.sh and (2) register-p.sh.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-928.NASL |
description | Javier Fernandez-Sanguino Pena from the Debian Security Audit project discovered that two scripts in the dhis-tools-dns package, DNS configuration utilities for a dynamic host information System, which are usually executed by root, create temporary files in an insecure fashion. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22794 |
published | 2006-10-14 |
reporter | This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/22794 |
title | Debian DSA-928-1 : dhis-tools-dns - insecure temporary file |
code |
|
References
- http://secunia.com/advisories/18227
- http://secunia.com/advisories/18227
- http://secunia.com/advisories/18228
- http://secunia.com/advisories/18228
- http://www.debian.org/security/2005/dsa-928
- http://www.debian.org/security/2005/dsa-928
- http://www.osvdb.org/21934
- http://www.osvdb.org/21934
- http://www.osvdb.org/21935
- http://www.osvdb.org/21935
- http://www.securityfocus.com/bid/16065
- http://www.securityfocus.com/bid/16065
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23859
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23859