Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA1066] DSA-1066-1 phpbb2


Vulnerability Assessment Details

[DSA1066] DSA-1066-1 phpbb2

Vulnerability Assessment Summary
DSA-1066-1 phpbb2

Detailed Explanation for this Vulnerability Assessment

It was discovered that phpbb2, a web based bulletin board, does
insufficiently sanitise values passed to the "Font Colour 3" setting,
which might lead to the execution of injected code by admin users.
The old stable distribution (woody) does not contain phpbb2 packages.
For the stable distribution (sarge) this problem has been fixed in
version 2.0.13+1-6sarge3.
For the unstable distribution (sid) this problem will be fixed soon.
We recommend that you upgrade your phpbb2 package.


Solution : http://www.debian.org/security/2006/dsa-1066
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2006 Michel Arboi

Cables, Connectors

642-883 Deploying Cisco Service Provider Network Routing Exam Test Simulator PDF
$3.99
642-883 Deploying Cisco Service Provider Network Routing Exam Test Simulator PDF picture600-455 Designing Cisco Unified Contact Center Exam Test Simulator PDF
$3.99
600-455 Designing Cisco Unified Contact Center Exam Test Simulator PDF pictureCisco Sg500-28 28-Port Gigabit Stackable Managed Switch-
$100.0
Cisco Sg500-28 28-Port Gigabit Stackable Managed Switch- picture210-451 Understanding Cisco Cloud Fundamentals Exam Test Simulator PDF
$3.99
210-451 Understanding Cisco Cloud Fundamentals Exam Test Simulator PDF picture


Discussions

No Discussions have been posted on this vulnerability.