lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070911185754.GA22545@steve.org.uk>
Date: Tue, 11 Sep 2007 19:57:54 +0100
From: Steve Kemp <skx@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 1374-1] New jffnms packages fix several vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


- ------------------------------------------------------------------------
Debian Security Advisory DSA 1374-1                  security@...ian.org
http://www.debian.org/security/                               Steve Kemp
September 11, 2007                    http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : jffnms
Vulnerability  : several vulnerabilities
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2007-3189, CVE-2007-3190, CVE-2007-3191

Several vulnerabilities have been discovered in jffnms, a web-based
Network Management System for IP networks.  The Common Vulnerabilities
and Exposures project identifies the following problems:

CVE-2007-3189

    Cross-site scripting (XSS) vulnerability in auth.php, which allows
    a remote attacker to inject arbitrary web script or HTML via the
    user parameter.

CVE-2007-3190

    Multiple SQL injection vulnerabilities in auth.php, which allow 
    remote attackers to execute arbitrary SQL commands via the
    user and password parameters.

CVE-2007-3192

    Direct requests to URLs make it possible for remote attackers to
    access configuration information, bypassing login restrictions.


For the stable distribution (etch), these problems have been fixed in version
0.8.3dfsg.1-2.1etch1

For the unstable distribution (sid), these problems have been fixed in
version 0.8.3dfsg.1-4.

We recommend that you upgrade your jffnms package.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Source archives:

  http://security.debian.org/pool/updates/main/j/jffnms/jffnms_0.8.3dfsg.1.orig.tar.gz
    Size/MD5 checksum:   547656 6be7ef656cf0eea1d133a0bc71a4bba2
  http://security.debian.org/pool/updates/main/j/jffnms/jffnms_0.8.3dfsg.1-2.1etch1.dsc
    Size/MD5 checksum:      609 7a46a6cdefe38535235aa87dd8e6279c
  http://security.debian.org/pool/updates/main/j/jffnms/jffnms_0.8.3dfsg.1-2.1etch1.diff.gz
    Size/MD5 checksum:    76283 cf3fd349e3012b93a4d20711730b26f6

Architecture independent packages:

  http://security.debian.org/pool/updates/main/j/jffnms/jffnms_0.8.3dfsg.1-2.1etch1_all.deb
    Size/MD5 checksum:   550292 94ec8551e3eaa20ae277a5aab47043ee


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG5uT5wM/Gs81MDZ0RAmvgAJ9voKojLJmyMF+VaB1B/aJNbbcTdwCfa/30
75t+GVJbnAqEuMHkj3xYZgQ=
=yEl5
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ