Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA164] DSA-164-1 cacti

Vulnerability Assessment Details

[DSA164] DSA-164-1 cacti

Vulnerability Assessment Summary
DSA-164-1 cacti

Detailed Explanation for this Vulnerability Assessment

A problem in cacti, a PHP based frontend to rrdtool for monitoring
systems and services, has been discovered. This could lead into cacti
executing arbitrary program code under the user id of the web server.
This problem, however, is only persistent to users who already have
administrator rights in the cacti system.
This problem has been fixed by removing any dollar signs and backticks
from the title string in version 0.6.7-2.1 for the current stable
distribution (woody) and in version 0.6.8a-2 for the unstable
distribution (sid). The old stable distribution (potato) is not
affected since it doesn't contain the cacti package.
We recommend that you upgrade your cacti package immediately.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Maxtor 27.2GB 3.5" IDE Hard Drive (92720U8)
Maxtor 27.2GB 3.5HGST 500GB Z5K500-500 Sata Laptop Hard Drive 5400 RPM
HGST 500GB  Z5K500-500 Sata Laptop Hard Drive 5400 RPM pictureGateway 7320GZ 15" Notebook , no hard drive or HD cover. damaged unit
Gateway 7320GZ 15Maxtor MaxLine Plus II 7Y250M006582P IBM p/n: 71P7298 250GB SATA A15-10
Maxtor MaxLine Plus II 7Y250M006582P IBM p/n: 71P7298 250GB SATA A15-10 picture


No Discussions have been posted on this vulnerability.