|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA899] DSA-899-1 egroupware Vulnerability Assessment Details
|
[DSA899] DSA-899-1 egroupware |
||
DSA-899-1 egroupware Detailed Explanation for this Vulnerability Assessment Several vulnerabilities have been discovered in egroupware, a web-based groupware suite. The Common Vulnerabilities and Exposures project identifies the following problems: Maksymilian Arciemowicz discovered several cross site scripting problems in phpsysinfo, which are also present in the imported version in egroupware and of which not all were fixed in DSA 724. Alexander Heidenreich discovered a cross-site scripting problem in the tree view of FUD Forum Bulletin Board Software, which is also present in egroupware and permits remote attackers to read private posts via a modified mid parameter. Christopher Kunz discovered that local variables get overwritten unconditionally in phpsyinfo, which are also present in egroupware, and are trusted later, which could lead to the inclusion of arbitrary files. Christopher Kunz discovered that user-supplied input is used unsanitised in phpsyinfo and imported in egroupware, causing a HTTP Response splitting problem. The old stable distribution (woody) does not contain egroupware packages. For the stable distribution (sarge) this problem has been fixed in version 1.0.0.007-2.dfsg-2sarge4. For the unstable distribution (sid) this problem has been fixed in version 1.0.0.009.dfsg-3-3. We recommend that you upgrade your egroupware packages. Solution : http://www.debian.org/security/2005/dsa-899 Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi |
||
Cables, Connectors |
Apple Macintosh SE Model M5011 Vintage Mac Computer | For Parts or Repair
$99.00
Vintage Macintosh Canvas Carry-On Bag Rainbow Apple (2 of 4)
$29.99
Apple PowerBook 180 Powers On 8MB RAM, 80 MB HD Vintage Macintosh “As-Is”
$149.00
Vintage Apple Mac OS8 Mouse Pad NOS
$26.99
Apple Power Macintosh G4 Vintage Mac M5183 PowerPC 7400 768MB RAM NO HDD/OS
$94.99
Micro miniature vintage Macintosh style computer collector or dollhouse
$24.99
Working Vintage Apple M2453 iBook G3 Clamshell Blueberry RAM Mac OS 9
$230.00
$4.99
Apple | Macintosh Performa 200 | Vintage Personal Computer | Beige Casing
$199.95
Apple Macintosh Classic Vintage Computer M0420 from 1991 For Parts Or Repair
$90.00
|
||
No Discussions have been posted on this vulnerability. |