Summary
The remote host is missing an update to glib2.0
announced via advisory MDVSA-2009:245.
Solution
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:245
Insight
A vulnerability was discovered and corrected in glib2.0:
The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory (CVE-2009-3289).
This update provides a solution to this vulnerability.
Affected: 2008.1, 2009.0, 2009.1, Enterprise Server 5.0
Severity
Classification
-
CVE CVE-2009-3289 -
CVSS Base Score: 4.4
AV:L/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities