The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[SECURITY] [DSA 764-1] New cacti packages fix several vulnerabilities


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Thu, 21 Jul 2005 07:53:41 +0200 (CEST)
From: [email protected] (Martin Schulze)
Subject: [SECURITY] [DSA 764-1] New cacti packages fix several vulnerabilities
Priority: urgent
Resent-Message-ID: <HiNvbC.A.TaH.8kz3CB@murphy.>
Reply-To: [email protected]
Mail-Followup-To: [email protected]
To: [email protected]
Resent-Date: Thu, 21 Jul 2005 00:57:16 -0500 (CDT)
Resent-From: [email protected] (Mailing List Manager)
X-Virus-Scanned: antivirus-gw at tyumen.ru

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 764-1                     [email protected]
http://www.debian.org/security/                             Martin Schulze
July 21st, 2005                         http://www.debian.org/security/faq
- --------------------------------------------------------------------------


Package        : cacti
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE IDs        : CAN-2005-1524 CAN-2005-1525 CAN-2005-1526 CAN-2005-2148 CAN-2005-2149
Debian Bug     : 316590 315703

Several vulnerabilities have been discovered in cacti, a round-robin
database (RRD) tool that helps create graphs from database
information.  The Common Vulnerabilities and Exposures Project
identifies the following problems:

CAN-2005-1524

    Maciej Piotr Falkiewicz and an anonymous researcher discovered an
    input validation bug that allows an attacker to include arbitrary
    PHP code from remote sites which will allow the execution of
    arbitrary code on the server running cacti.


CAN-2005-1525

    Due to mising input validation cacti allows a remote attacker to
    insert arbitrary SQL statements.


CAN-2005-1526

    Maciej Piotr Falkiewicz discovered an input validation bug that
    allows an attacker to include arbitrary PHP code from remote sites
    which will allow the execution of arbitrary code on the server
    running cacti.


CAN-2005-2148

    Stefan Esser discovered that the update for the abovely mentioned
    vulnerabilities does not perform proper input validation to
    protect against common attacks.


CAN-2005-2149

    Stefan Esser discovered that the update for CAN-2005-1525 allows
    remote attackers to modify session information to gain privileges
    and disable the use of addslashes to protect against SQL
    injection.


For the old stable distribution (woody) these problems have been fixed in
version 0.6.7-2.5.

For the stable distribution (sarge) these problems have been fixed in
version 0.8.6c-7sarge2.

For the unstable distribution (sid) these problems have been fixed in
version 0.8.6e-1.

We recommend that you upgrade your cacti package.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/c/cacti/cacti_0.6.7-2.5.dsc
      Size/MD5 checksum:      565 ca9cffd44ea6e8235005ce8e066fb88e
    http://security.debian.org/pool/updates/main/c/cacti/cacti_0.6.7-2.5.diff.gz
      Size/MD5 checksum:    25286 18aad674e7ef91dafb11af9a02c677d7
    http://security.debian.org/pool/updates/main/c/cacti/cacti_0.6.7.orig.tar.gz
      Size/MD5 checksum:   206608 b004ac1ca1dd18737f0fa685fe18737c

  Architecture independent components:

    http://security.debian.org/pool/updates/main/c/cacti/cacti_0.6.7-2.5_all.deb
      Size/MD5 checksum:   212418 ae47dc9aeb1820c5074fc39c5b6c84bc


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/c/cacti/cacti_0.8.6c-7sarge2.dsc
      Size/MD5 checksum:      595 50f791f80662a02e982e82e4be7e59b5
    http://security.debian.org/pool/updates/main/c/cacti/cacti_0.8.6c-7sarge2.diff.gz
      Size/MD5 checksum:    42575 a9959e2d720a6f7188c5713494b9eaaa
    http://security.debian.org/pool/updates/main/c/cacti/cacti_0.8.6c.orig.tar.gz
      Size/MD5 checksum:  1046586 b4130300f671e773ebea3b8f715912c1

  Architecture independent components:

    http://security.debian.org/pool/updates/main/c/cacti/cacti_0.8.6c-7sarge2_all.deb
      Size/MD5 checksum:  1058544 2b5fe2ca0dc11a199c20f5bf7b3aa7ee


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: [email protected]
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<;pkg>


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFC3zhkW5ql+IAeqTIRAh4wAKCrgt02H1mCAVIRswU+tokjF4eVIgCfYuNE
V6ZewFZQrF1BzV4LVF1e3EI=
=GhQZ
-----END PGP SIGNATURE-----



<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру