CERTA-2004-AVI-085
Vulnerability from certfr_avis - Published: - Updated:None
Description
Le paquetage sysstat comprend un ensemble d'outils (sar, iostat, etc.) permettant de visualiser les performances du système.
Une vulnérabilité (mauvaise gestion des fichiers temporaires) présente dans la commande isag (outil graphique de visualisation des statistiques) peut être exploitée par un utilisateur mal intentionné afin de corrompre n'importe quel fichier du système accessible en écriture par l'utilisateur lançant la commande isag.
Solution
La version 5.0.2 de sysstat corrige cette vulnérabilité.
Versions des sources de sysstat antérieures à la version 5.0.2.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eVersions des sources de \u003cTT\u003esysstat\u003c/TT\u003e ant\u00e9rieures \u00e0 la version 5.0.2.\u003c/p\u003e",
"content": "## Description\n\nLe paquetage sysstat comprend un ensemble d\u0027outils (sar, iostat, etc.)\npermettant de visualiser les performances du syst\u00e8me.\n\nUne vuln\u00e9rabilit\u00e9 (mauvaise gestion des fichiers temporaires) pr\u00e9sente\ndans la commande isag (outil graphique de visualisation des\nstatistiques) peut \u00eatre exploit\u00e9e par un utilisateur mal intentionn\u00e9\nafin de corrompre n\u0027importe quel fichier du syst\u00e8me accessible en\n\u00e9criture par l\u0027utilisateur lan\u00e7ant la commande isag.\n\n## Solution\n\nLa version 5.0.2 de sysstat corrige cette vuln\u00e9rabilit\u00e9.\n",
"cves": [],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200404-04 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200404-04.xml"
},
{
"title": "Page de sysstat :",
"url": "http://perso.wanadoo.fr/sebastien.godard"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RHSA-2004:093 de Red Hat :",
"url": "http://rhn.redhat.com/errata/RHSA-2004-093.html"
}
],
"reference": "CERTA-2004-AVI-085",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2004-03-15T00:00:00.000000"
},
{
"description": "ajout du bulletin de s\u00e9curit\u00e9 Gentoo et d\u0027une r\u00e9f\u00e9rence CVE.",
"revision_date": "2004-04-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Corruption de donn\u00e9es"
}
],
"summary": null,
"title": "Vuln\u00e9rabilit\u00e9 de sysstat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 DSA-460 de Debian",
"url": "http://www.debian.org/security/2004/dsa-460"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RHSA-2004:053 de Red Hat",
"url": "http://rhn.redhat.com/errata/RHSA-2004-053.html"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…