Vulnerabilities > CVE-2006-6939 - Unspecified vulnerability in GNU ED 0.2

047910
CVSS 4.6 - MEDIUM
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
local
low complexity
gnu
nessus

Summary

GNU ed before 0.3 allows local users to overwrite arbitrary files via a symlink attack on temporary files, possibly in the open_sbuf function.

Vulnerable Configurations

Part Description Count
Application
Gnu
2

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2007-100.NASL
    description - Thu Jan 18 2007 Karsten Hopp <karsten at redhat.com> 0.3-0.fc6 - rebuild for FC-6, fixes CVE-2006-6939 - Thu Jan 18 2007 Karsten Hopp <karsten at redhat.com> 0.3-2 - fix man page permissions (#222581) - Mon Nov 13 2006 Karsten Hopp <karsten at redhat.com> 0.3-1 - update to ed-0.3 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id24231
    published2007-01-19
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/24231
    titleFedora Core 6 : ed-0.3-0.fc6 (2007-100)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2007-100.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(24231);
      script_version ("1.15");
      script_cvs_date("Date: 2019/08/02 13:32:25");
    
      script_cve_id("CVE-2006-6939");
      script_xref(name:"FEDORA", value:"2007-100");
    
      script_name(english:"Fedora Core 6 : ed-0.3-0.fc6 (2007-100)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora Core host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "  - Thu Jan 18 2007 Karsten Hopp <karsten at redhat.com>
        0.3-0.fc6
    
        - rebuild for FC-6, fixes CVE-2006-6939
    
        - Thu Jan 18 2007 Karsten Hopp <karsten at redhat.com>
          0.3-2
    
        - fix man page permissions (#222581)
    
        - Mon Nov 13 2006 Karsten Hopp <karsten at redhat.com>
          0.3-1
    
        - update to ed-0.3
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2007-January/001287.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?7c81724c"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected ed and / or ed-debuginfo packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:ed");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:ed-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora_core:6");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2007/01/18");
      script_set_attribute(attribute:"plugin_publication_date", value:"2007/01/19");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 6.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC6", reference:"ed-0.3-0.fc6")) flag++;
    if (rpm_check(release:"FC6", reference:"ed-debuginfo-0.3-0.fc6")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ed / ed-debuginfo");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2007-099.NASL
    description - Thu Jan 18 2007 Karsten Hopp <karsten at redhat.com> 0.3-0.fc6 - rebuild for FC-6, fixes CVE-2006-6939 - Thu Jan 18 2007 Karsten Hopp <karsten at redhat.com> 0.3-2 - fix man page permissions (#222581) - Mon Nov 13 2006 Karsten Hopp <karsten at redhat.com> 0.3-1 - update to ed-0.3 - Wed Jul 12 2006 Jesse Keating <jkeating at redhat.com> - 0.2-38.2.2 - rebuild Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id24230
    published2007-01-19
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/24230
    titleFedora Core 5 : ed-0.3-0.fc5 (2007-099)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2007-099.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(24230);
      script_version ("1.13");
      script_cvs_date("Date: 2019/08/02 13:32:25");
    
      script_cve_id("CVE-2006-6939");
      script_xref(name:"FEDORA", value:"2007-099");
    
      script_name(english:"Fedora Core 5 : ed-0.3-0.fc5 (2007-099)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora Core host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "  - Thu Jan 18 2007 Karsten Hopp <karsten at redhat.com>
        0.3-0.fc6
    
        - rebuild for FC-6, fixes CVE-2006-6939
    
        - Thu Jan 18 2007 Karsten Hopp <karsten at redhat.com>
          0.3-2
    
        - fix man page permissions (#222581)
    
        - Mon Nov 13 2006 Karsten Hopp <karsten at redhat.com>
          0.3-1
    
        - update to ed-0.3
    
        - Wed Jul 12 2006 Jesse Keating <jkeating at redhat.com>
          - 0.2-38.2.2
    
        - rebuild
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2007-January/001286.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?da1818d9"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected ed and / or ed-debuginfo packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:ed");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:ed-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora_core:5");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2007/01/18");
      script_set_attribute(attribute:"plugin_publication_date", value:"2007/01/19");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^5([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 5.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC5", reference:"ed-0.3-0.fc5")) flag++;
    if (rpm_check(release:"FC5", reference:"ed-debuginfo-0.3-0.fc5")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ed / ed-debuginfo");
    }
    

Statements

contributorMark J Cox
lastmodified2007-01-18
organizationRed Hat
statementRed Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=223072 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.