RHEL 2.1 : mc (RHSA-2004:035)

high Nessus Plugin ID 12456

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated mc packages that resolve a buffer overflow vulnerability are now available.

Midnight Commander is a visual shell much like a file manager.

A buffer overflow has been found in Midnight Commander's virtual filesystem code. Specifically, a stack-based buffer overflow in vfs_s_resolve_symlink of vfs/direntry.c allows remote attackers to execute arbitrary code during symlink conversion.

Users of Midnight Commander should install these updated packages, which resolve this issue.

Solution

Update the affected gmc, mc and / or mcserv packages.

See Also

https://access.redhat.com/security/cve/cve-2003-1023

https://access.redhat.com/errata/RHSA-2004:035

Plugin Details

Severity: High

ID: 12456

File Name: redhat-RHSA-2004-035.nasl

Version: 1.27

Type: local

Agent: unix

Published: 7/6/2004

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:gmc, p-cpe:/a:redhat:enterprise_linux:mc, p-cpe:/a:redhat:enterprise_linux:mcserv, cpe:/o:redhat:enterprise_linux:2.1

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 2/3/2004

Vulnerability Publication Date: 1/20/2004

Reference Information

CVE: CVE-2003-1023

RHSA: 2004:035