lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 27 Mar 2008 16:14:05 -0600
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2008:079 ] - Updated sarg packages fix
	multiple vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDVSA-2008:079
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : sarg
 Date    : March 27, 2008
 Affected: 2007.0, 2007.1, 2008.0, Multi Network Firewall 2.0
 _______________________________________________________________________
 
 Problem Description:
 
 A stack-based buffer overflow in sarg (Squid Analysis Report Generator)
 allowed remote attackers to execute arbitrary code via a long Squid
 proxy server User-Agent header (CVE-2008-1167).
 
 A cross-site scripting vulnerability in sarg version 2.x prior to
 2.2.5 allowed remote attackers to inject arbitrary web script or
 HTML via the User-Agent heder, which is not properly handled when
 displaying the Squid proxy log (CVE-2008-1168).
 
 In addition, a number of other fixes have been made such as making
 the getword() function more robust which should prevent any overflows,
 other segfaults have been fixed, and the useragent report is now more
 consistent with the other reports.
 
 The updated packages have been patched to correct these issues.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1167
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1168
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 58e1392f51ac7b5a9448cf115ebdb873  2007.0/i586/sarg-2.2.5-0.2mdv2007.0.i586.rpm 
 f371cca6116e77d468cc2448411e519d  2007.0/SRPMS/sarg-2.2.5-0.2mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 c0653588b531b967a14060d798fbead5  2007.0/x86_64/sarg-2.2.5-0.2mdv2007.0.x86_64.rpm 
 f371cca6116e77d468cc2448411e519d  2007.0/SRPMS/sarg-2.2.5-0.2mdv2007.0.src.rpm

 Mandriva Linux 2007.1:
 df54b85b57812799134352f39b0d33da  2007.1/i586/sarg-2.2.5-0.2mdv2007.1.i586.rpm 
 13ab13a2899555be0a75424baa334374  2007.1/SRPMS/sarg-2.2.5-0.2mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 784c6b0bb36ca30853d0c1ccbb26cb8f  2007.1/x86_64/sarg-2.2.5-0.2mdv2007.1.x86_64.rpm 
 13ab13a2899555be0a75424baa334374  2007.1/SRPMS/sarg-2.2.5-0.2mdv2007.1.src.rpm

 Mandriva Linux 2008.0:
 3cd060eaef73255b0252529ea80f4873  2008.0/i586/sarg-2.2.5-0.2mdv2008.0.i586.rpm 
 695d91f0647d0097047e14abb09df4f5  2008.0/SRPMS/sarg-2.2.5-0.2mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 cf17fe2e63bcd5afb2b274ae8164892b  2008.0/x86_64/sarg-2.2.5-0.2mdv2008.0.x86_64.rpm 
 695d91f0647d0097047e14abb09df4f5  2008.0/SRPMS/sarg-2.2.5-0.2mdv2008.0.src.rpm

 Multi Network Firewall 2.0:
 b64d9f675b66d14ee65541156d28b052  mnf/2.0/i586/sarg-2.2.5-0.1.M20mdk.i586.rpm 
 3d6ffd13a3be1adefcf4e34f06aba0f2  mnf/2.0/SRPMS/sarg-2.2.5-0.1.M20mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFH6/FVmqjQ0CJFipgRAmyGAKCIzdfjmx2eaZ8bH6RD0FD97nM+vQCeM59D
L5rFowu3o0IAq2VpYhP79FI=
=ZXoh
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ