[<prev] [next>] [day] [month] [year] [list]
Message-ID: <m1FEhdA-000oftC@finlandia.Infodrom.North.DE>
Date: Thu Mar 2 06:57:21 2006
From: joey at infodrom.org (Martin Schulze)
Subject: [SECURITY] [DSA 980-1] New tutos package fixes
several vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Debian Security Advisory DSA 980-1 security@...ian.org
http://www.debian.org/security/ Moritz Muehlenhoff
February 22nd, 2006 http://www.debian.org/security/faq
- --------------------------------------------------------------------------
Package : tutos
Vulnerability : several
Problem-Type : remote
Debian-specific: no
CVE IDs : CVE-2004-2161 CVE-2004-2162
Debian Bug : 318633
Joxean Koret discovered several security problems in tutos, a web-based
team organization software. The Common Vulnerabilities and Exposures Project
identifies the following problems:
CVE-2004-2161
An SQL injection vulnerability allows the execution of SQL commands
through the link_id parameter in file_overview.php.
CVE-2004-2162
Cross-Site-Scripting vulnerabilities in the search function of the
address book and in app_new.php allow the execution of web script
code.
The old stable distribution (woody) does not contain tutos packages.
For the stable distribution (sarge) these problems have been fixed in
version 1.1.20031017-2+1sarge1.
The unstable distribution (sid) does no longer contain tutos packages.
We recommend that you upgrade your tutos package.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/t/tutos/tutos_1.1.20031017-2+1sarge1.dsc
Size/MD5 checksum: 575 7babaefc5a7e57afc2fb421d5829c4cf
http://security.debian.org/pool/updates/main/t/tutos/tutos_1.1.20031017-2+1sarge1.tar.gz
Size/MD5 checksum: 4955293 c9c539f0d5504d69377e326870db18c3
Architecture independent components:
http://security.debian.org/pool/updates/main/t/tutos/tutos_1.1.20031017-2+1sarge1_all.deb
Size/MD5 checksum: 4760050 39bb9b2f3e9655c7060f04a5dac83e09
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
iD8DBQFEBpWHW5ql+IAeqTIRAhgCAJ4iFpaGqnaTkhuJoRldeiT7kV6sewCguiw7
Z7u1L9U0ULvcvoZTLHWf6Ac=
=KWap
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists