Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA682] DSA-682-1 awstats


Vulnerability Assessment Details

[DSA682] DSA-682-1 awstats

Vulnerability Assessment Summary
DSA-682-1 awstats

Detailed Explanation for this Vulnerability Assessment

In addition to CVE-2005-0116 more vulnerabilities have been found in
awstats, a powerful and featureful web server log analyzer with a CGI
frontend. Missing input sanitising can cause arbitrary commands to be
executed.
For the stable distribution (woody) this problem has been fixed in
version 4.0-0.woody.2.
For the unstable distribution (sid) this problem has been fixed in
version 6.2-1.2.
We recommend that you upgrade your awstats package.


Solution : http://www.debian.org/security/2005/dsa-682
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

ASUS M5A78L-M LX V2 mATX AMD AM3+ Computer Motherboard
$15.88
ASUS M5A78L-M LX V2 mATX AMD AM3+ Computer Motherboard pictureLenovo Yoga 2 11 20332 Intel N3530 Motherboard 5B20G41907 NM-A201 AIUU1 AS IS
$49.99
Lenovo Yoga 2 11 20332 Intel N3530 Motherboard 5B20G41907 NM-A201 AIUU1 AS IS pictureLenovo Ideapad Yoga 2 Pro Laptop Intel Core i7-4510U 8GB Motherboard 5B20G38213
$223.84
Lenovo Ideapad Yoga 2 Pro Laptop Intel Core i7-4510U 8GB Motherboard 5B20G38213  picture Apple iPad Mini 2 2nd Generation Logic Board Motherboard WiFi A1489
$22.25
 Apple iPad Mini 2 2nd Generation Logic Board Motherboard WiFi A1489 picture


Discussions

No Discussions have been posted on this vulnerability.