lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 22 Feb 2006 15:40:41 +0100
From: Michael Stone <mstone@...cker.debian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 980-1] New tutos packages fix multiple vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 980-1                     security@...ian.org
http://www.debian.org/security/                         Moritz Muehlenhoff
February 22nd, 2006                     http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : tutos
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2004-2161 CVE-2004-2162
Debian Bug     : 318633

Joxean Koret discovered several security problems in tutos, a web-based
team organization software. The Common Vulnerabilities and Exposures Project
identifies the following problems:

 CVE-2004-2161

     An SQL injection vulnerability allows the execution of SQL commands
     through the link_id parameter in file_overview.php.

 CVE-2004-2162

     Cross-Site-Scripting vulnerabilities in the search function of the
     address book and in app_new.php allow the execution of web script
     code.

The old stable distribution (woody) does not contain tutos packages.

For the stable distribution (sarge) these problems have been fixed in
version 1.1.20031017-2+1sarge1.

The unstable distribution (sid) does no longer contain tutos packages.

We recommend that you upgrade your tutos package.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/t/tutos/tutos_1.1.20031017-2+1sarge1.dsc
      Size/MD5 checksum:      575 7babaefc5a7e57afc2fb421d5829c4cf
    http://security.debian.org/pool/updates/main/t/tutos/tutos_1.1.20031017-2+1sarge1.tar.gz
      Size/MD5 checksum:  4955293 c9c539f0d5504d69377e326870db18c3

  Architecture independent components:

    http://security.debian.org/pool/updates/main/t/tutos/tutos_1.1.20031017-2+1sarge1_all.deb
      Size/MD5 checksum:  4760050 39bb9b2f3e9655c7060f04a5dac83e09

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iQCVAwUBQ/x14A0hVr09l8FJAQL8JgQAyypfHSIb4USUNyXZ2WLzVrmdHGFW9KbS
xUWFZ9uEkC/AH6i1d/eQ/3Prqy52xHlIIkv5DbLQUg35Q8pxqp+dAZLoU0NrLINv
To0KqtYp/DzZ7Elk0zv9wWDgUiNec2KX7qc2P2BmUZV7KbP4D1XVvEthELXeAgBB
I8Ojlecr83A=
=Chb3
-----END PGP SIGNATURE-----



Powered by blists - more mailing lists