[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20030902111104.AB5AF9FBAF@noc.internal.fairytale.se>
Date: Tue, 2 Sep 2003 13:11:04 +0200 (CEST)
From: aliz@...too.org (Daniel Ahlberg)
To: gentoo-announce@...too.org, bugtraq@...urityfocus.com,
full-disclosure@...ts.netsys.com
Subject: GLSA: gallery (200309-06)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- - - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200309-06
- - - ---------------------------------------------------------------------
PACKAGE : gallery
SUMMARY : cross site scripting
DATE : 2003-09-02 11:11 UTC
EXPLOIT : remote
VERSIONS AFFECTED : <gallery-1.3.4_p1
FIXED VERSION : >=gallery-1.3.4_p1
CVE : CAN-2003-0614
- - - ---------------------------------------------------------------------
quote from cve:
"Cross-site scripting (XSS) vulnerability in search.php of Gallery 1.1
through 1.3.4 allows remote attackers to insert arbitrary web script via
the searchstring parameter."
SOLUTION
It is recommended that all Gentoo Linux users who are running
app-misc/gallery upgrade to gallery-1.3.4_p1 as follows:
emerge sync
emerge gallery
emerge clean
- - - ---------------------------------------------------------------------
aliz@...too.org - GnuPG key is available at http://dev.gentoo.org/~aliz
- - - ---------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)
iD8DBQE/VHrIfT7nyhUpoZMRAmnFAJ0cjJdRdiIDH7My8GULs80rpRTi0ACgpf3M
79zsdZ+rPjDDFG8HGLdPzdg=
=WE/w
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists