Vulnerabilities > CVE-2007-5079 - Unspecified vulnerability in Redhat Linux 4.0

047910
CVSS 6.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
SINGLE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
redhat
nessus

Summary

Red Hat Enterprise Linux 4 does not properly compile and link gdm with tcp_wrappers on x86_64 platforms, which might allow remote attackers to bypass intended access restrictions.

Vulnerable Configurations

Part Description Count
OS
Redhat
1

Nessus

  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2010-0657.NASL
    descriptionAn updated gdm package that fixes one security issue and one bug is now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The GNOME Display Manager (GDM) is a configurable re-implementation of XDM, the X Display Manager. GDM allows you to log in to your system with the X Window System running, and supports running several different X sessions on your local machine at the same time. A flaw was found in the way the gdm package was built. The gdm package was missing TCP wrappers support on 64-bit platforms, which could result in an administrator believing they had access restrictions enabled when they did not. (CVE-2007-5079) This update also fixes the following bug : * sometimes the system would hang instead of properly shutting down when a user chose
    last seen2020-06-01
    modified2020-06-02
    plugin id48912
    published2010-08-29
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/48912
    titleCentOS 4 : gdm (CESA-2010:0657)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2010:0657 and 
    # CentOS Errata and Security Advisory 2010:0657 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(48912);
      script_version("1.11");
      script_cvs_date("Date: 2019/10/25 13:36:05");
    
      script_cve_id("CVE-2007-5079");
      script_xref(name:"RHSA", value:"2010:0657");
    
      script_name(english:"CentOS 4 : gdm (CESA-2010:0657)");
      script_summary(english:"Checks rpm output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote CentOS host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An updated gdm package that fixes one security issue and one bug is
    now available for Red Hat Enterprise Linux 4.
    
    The Red Hat Security Response Team has rated this update as having low
    security impact. A Common Vulnerability Scoring System (CVSS) base
    score, which gives a detailed severity rating, is available from the
    CVE link in the References section.
    
    The GNOME Display Manager (GDM) is a configurable re-implementation of
    XDM, the X Display Manager. GDM allows you to log in to your system
    with the X Window System running, and supports running several
    different X sessions on your local machine at the same time.
    
    A flaw was found in the way the gdm package was built. The gdm package
    was missing TCP wrappers support on 64-bit platforms, which could
    result in an administrator believing they had access restrictions
    enabled when they did not. (CVE-2007-5079)
    
    This update also fixes the following bug :
    
    * sometimes the system would hang instead of properly shutting down
    when a user chose 'Shut down' from the login screen. (BZ#625818)
    
    All users should upgrade to this updated package, which contains
    backported patches to correct these issues. GDM must be restarted for
    this update to take effect. Rebooting achieves this, but changing the
    runlevel from 5 to 3 and back to 5 also restarts GDM."
      );
      # https://lists.centos.org/pipermail/centos-announce/2010-August/016948.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?41791edd"
      );
      # https://lists.centos.org/pipermail/centos-announce/2010-August/016949.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?9880ea6c"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected gdm package.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:gdm");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:4");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2007/09/24");
      script_set_attribute(attribute:"patch_publication_date", value:"2010/08/27");
      script_set_attribute(attribute:"plugin_publication_date", value:"2010/08/29");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"CentOS Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/CentOS/release", "Host/CentOS/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/CentOS/release");
    if (isnull(release) || "CentOS" >!< release) audit(AUDIT_OS_NOT, "CentOS");
    os_ver = pregmatch(pattern: "CentOS(?: Linux)? release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "CentOS");
    os_ver = os_ver[1];
    if (! preg(pattern:"^4([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "CentOS 4.x", "CentOS " + os_ver);
    
    if (!get_kb_item("Host/CentOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && "ia64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "CentOS", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"CentOS-4", cpu:"i386", reference:"gdm-2.6.0.5-7.rhel4.19.el4_8.2")) flag++;
    if (rpm_check(release:"CentOS-4", cpu:"x86_64", reference:"gdm-2.6.0.5-7.rhel4.19.el4_8.2")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gdm");
    }
    
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20100826_GDM_ON_SL4_X.NASL
    descriptionA flaw was found in the way the gdm package was built. The gdm package was missing TCP wrappers support on 64-bit platforms, which could result in an administrator believing they had access restrictions enabled when they did not. (CVE-2007-5079) This update also fixes the following bug : - sometimes the system would hang instead of properly shutting down when a user chose
    last seen2020-06-01
    modified2020-06-02
    plugin id60846
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/60846
    titleScientific Linux Security Update : gdm on SL4.x i386/x86_64
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2010-0657.NASL
    descriptionFrom Red Hat Security Advisory 2010:0657 : An updated gdm package that fixes one security issue and one bug is now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The GNOME Display Manager (GDM) is a configurable re-implementation of XDM, the X Display Manager. GDM allows you to log in to your system with the X Window System running, and supports running several different X sessions on your local machine at the same time. A flaw was found in the way the gdm package was built. The gdm package was missing TCP wrappers support on 64-bit platforms, which could result in an administrator believing they had access restrictions enabled when they did not. (CVE-2007-5079) This update also fixes the following bug : * sometimes the system would hang instead of properly shutting down when a user chose
    last seen2020-06-01
    modified2020-06-02
    plugin id68090
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68090
    titleOracle Linux 4 : gdm (ELSA-2010-0657)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2010-0657.NASL
    descriptionAn updated gdm package that fixes one security issue and one bug is now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The GNOME Display Manager (GDM) is a configurable re-implementation of XDM, the X Display Manager. GDM allows you to log in to your system with the X Window System running, and supports running several different X sessions on your local machine at the same time. A flaw was found in the way the gdm package was built. The gdm package was missing TCP wrappers support on 64-bit platforms, which could result in an administrator believing they had access restrictions enabled when they did not. (CVE-2007-5079) This update also fixes the following bug : * sometimes the system would hang instead of properly shutting down when a user chose
    last seen2020-06-01
    modified2020-06-02
    plugin id48899
    published2010-08-27
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/48899
    titleRHEL 4 : gdm (RHSA-2010:0657)

Redhat

advisories
bugzilla
id625818
titlegdm/ cannot shutdown system
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 4 is installed
      ovaloval:com.redhat.rhba:tst:20070304025
    • commentgdm is earlier than 1:2.6.0.5-7.rhel4.19.el4_8.2
      ovaloval:com.redhat.rhsa:tst:20100657001
    • commentgdm is signed with Red Hat master key
      ovaloval:com.redhat.rhsa:tst:20070286002
rhsa
idRHSA-2010:0657
released2010-08-26
severityLow
titleRHSA-2010:0657: gdm security and bug fix update (Low)
rpms
  • gdm-1:2.6.0.5-7.rhel4.19.el4_8.2
  • gdm-debuginfo-1:2.6.0.5-7.rhel4.19.el4_8.2

Statements

contributorJoshua Bressers
lastmodified2010-08-26
organizationRed Hat
statementRed Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=181302 An update has been released which resolves this issue: http://rhn.redhat.com/errata/RHSA-2010-0657.html