lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060523072318.GB5291@piware.de>
Date: Tue May 23 08:22:14 2006
From: martin.pitt at canonical.com (Martin Pitt)
Subject: [USN-285-1] awstats vulnerability

===========================================================
Ubuntu Security Notice USN-285-1	       May 23, 2006
awstats vulnerability
CVE-2006-2237
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

awstats

The problem can be corrected by upgrading the affected package to
version 6.3-1ubuntu0.2 (for Ubuntu 5.04), or 6.4-1ubuntu1.1 (for
Ubuntu 5.10).  In general, a standard system upgrade is sufficient to
effect the necessary changes.

Details follow:

AWStats did not properly sanitize the 'migrate' CGI parameter.  If the
update of the stats via web front-end is allowed, a remote attacker
could execute arbitrary commands on the server with the privileges of
the AWStats server.

This does not affect AWStats installations which only build static
pages.

Updated packages for Ubuntu 5.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.3-1ubuntu0.2.diff.gz
      Size/MD5:    25306 1f013ca8aaad65d8f3ae148e194b3551
    http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.3-1ubuntu0.2.dsc
      Size/MD5:      595 46a103a327e1f1bad3876927c7e66198
    http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.3.orig.tar.gz
      Size/MD5:   938794 edb73007530a5800d53b9f1f90c88053

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.3-1ubuntu0.2_all.deb
      Size/MD5:   726430 728ee50f468a4cf3693a32b98c94b455

Updated packages for Ubuntu 5.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.4-1ubuntu1.1.diff.gz
      Size/MD5:    18541 e186b842fbd2d4d97b65eacf7c9c1295
    http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.4-1ubuntu1.1.dsc
      Size/MD5:      595 c5784c2c1bfa002abbfa77d936bc2da5
    http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.4.orig.tar.gz
      Size/MD5:   918435 056e6fb0c7351b17fe5bbbe0aa1297b1

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/a/awstats/awstats_6.4-1ubuntu1.1_all.deb
      Size/MD5:   728490 60ca39a436e3a21a838560db5d8a5f3b
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 191 bytes
Desc: Digital signature
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060523/e49de4d1/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ