Summary
The remote host is missing an update to glibc
announced via advisory DSA 636-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20636-1
Insight
Several insecure uses of temporary files have been discovered in support scripts in the libc6 package which provices the c library for a GNU/Linux system. Trustix developers found that the catchsegv script uses temporary files insecurely. Openwall developers discovered insecure temporary files in the glibcbug script. These scripts are vulnerable to a symlink attack.
For the stable distribution (woody) these problems have been fixed in version 2.2.5-11.8.
For the unstable distribution (sid) these problems have been fixed in version 2.3.2.ds1-20.
We recommend that you upgrade your libc6 package.
Severity
Classification
-
CVE CVE-2004-0968 -
CVSS Base Score: 2.1
AV:L/AC:L/Au:N/C:N/I:P/A:N
Related Vulnerabilities