Summary
The remote host is missing an update to gforge
announced via advisory DSA 1402-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201402-1
Insight
Steve Kemp from the Debian Security Audit project discovered that gforge, a collaborative development tool, used temporary files insecurely which could allow local users to truncate files upon the system with the privileges of the gforge user, or create a denial of service attack.
For the stable distribution (etch), this problem has been fixed in version 4.5.14-22etch3.
For the old stable distribution (sarge), this problem has been fixed in version 3.1-31sarge4.
We recommend that you upgrade your gforge package.
Severity
Classification
-
CVE CVE-2007-3921 -
CVSS Base Score: 3.3
AV:L/AC:M/Au:N/C:N/I:P/A:P
Related Vulnerabilities