CERTA-2004-AVI-085
Vulnerability from certfr_avis
None
Description
Le paquetage sysstat comprend un ensemble d'outils (sar, iostat, etc.) permettant de visualiser les performances du système.
Une vulnérabilité (mauvaise gestion des fichiers temporaires) présente dans la commande isag (outil graphique de visualisation des statistiques) peut être exploitée par un utilisateur mal intentionné afin de corrompre n'importe quel fichier du système accessible en écriture par l'utilisateur lançant la commande isag.
Solution
La version 5.0.2 de sysstat corrige cette vulnérabilité.
Versions des sources de sysstat antérieures à la version 5.0.2.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eVersions des sources de \u003cTT\u003esysstat\u003c/TT\u003e ant\u00e9rieures \u00e0 la version 5.0.2.\u003c/p\u003e",
"content": "## Description\n\nLe paquetage sysstat comprend un ensemble d\u0027outils (sar, iostat, etc.)\npermettant de visualiser les performances du syst\u00e8me.\n\nUne vuln\u00e9rabilit\u00e9 (mauvaise gestion des fichiers temporaires) pr\u00e9sente\ndans la commande isag (outil graphique de visualisation des\nstatistiques) peut \u00eatre exploit\u00e9e par un utilisateur mal intentionn\u00e9\nafin de corrompre n\u0027importe quel fichier du syst\u00e8me accessible en\n\u00e9criture par l\u0027utilisateur lan\u00e7ant la commande isag.\n\n## Solution\n\nLa version 5.0.2 de sysstat corrige cette vuln\u00e9rabilit\u00e9.\n",
"cves": [],
"initial_release_date": "2004-03-15T00:00:00",
"last_revision_date": "2004-04-07T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200404-04 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200404-04.xml"
},
{
"title": "Page de sysstat :",
"url": "http://perso.wanadoo.fr/sebastien.godard"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RHSA-2004:093 de Red Hat :",
"url": "http://rhn.redhat.com/errata/RHSA-2004-093.html"
}
],
"reference": "CERTA-2004-AVI-085",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2004-03-15T00:00:00.000000"
},
{
"description": "ajout du bulletin de s\u00e9curit\u00e9 Gentoo et d\u0027une r\u00e9f\u00e9rence CVE.",
"revision_date": "2004-04-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Corruption de donn\u00e9es"
}
],
"summary": null,
"title": "Vuln\u00e9rabilit\u00e9 de sysstat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 DSA-460 de Debian",
"url": "http://www.debian.org/security/2004/dsa-460"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RHSA-2004:053 de Red Hat",
"url": "http://rhn.redhat.com/errata/RHSA-2004-053.html"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…