Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA899] DSA-899-1 egroupware


Vulnerability Assessment Details

[DSA899] DSA-899-1 egroupware

Vulnerability Assessment Summary
DSA-899-1 egroupware

Detailed Explanation for this Vulnerability Assessment

Several vulnerabilities have been discovered in egroupware, a
web-based groupware suite. The Common Vulnerabilities and Exposures
project identifies the following problems:
Maksymilian Arciemowicz discovered several cross site scripting
problems in phpsysinfo, which are also present in the imported
version in egroupware and of which not all were fixed in DSA 724.
Alexander Heidenreich discovered a cross-site scripting problem in
the tree view of FUD Forum Bulletin Board Software, which is also
present in egroupware and permits remote attackers to read private
posts via a modified mid parameter.
Christopher Kunz discovered that local variables get overwritten
unconditionally in phpsyinfo, which are also present in
egroupware, and are trusted later, which could lead to the
inclusion of arbitrary files.
Christopher Kunz discovered that user-supplied input is used
unsanitised in phpsyinfo and imported in egroupware, causing a
HTTP Response splitting problem.
The old stable distribution (woody) does not contain egroupware packages.
For the stable distribution (sarge) this problem has been fixed in
version 1.0.0.007-2.dfsg-2sarge4.
For the unstable distribution (sid) this problem has been fixed in
version 1.0.0.009.dfsg-3-3.
We recommend that you upgrade your egroupware packages.


Solution : http://www.debian.org/security/2005/dsa-899
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi

Cables, Connectors


Apple Macintosh SE Model M5011 Vintage Mac Computer | For Parts or Repair picture

Apple Macintosh SE Model M5011 Vintage Mac Computer | For Parts or Repair

$99.00



Vintage Macintosh Canvas Carry-On Bag Rainbow Apple (2 of 4) picture

Vintage Macintosh Canvas Carry-On Bag Rainbow Apple (2 of 4)

$29.99



Apple PowerBook 180 Powers On 8MB RAM, 80 MB HD Vintage Macintosh “As-Is” picture

Apple PowerBook 180 Powers On 8MB RAM, 80 MB HD Vintage Macintosh “As-Is”

$149.00



Vintage Apple Mac OS8 Mouse Pad NOS picture

Vintage Apple Mac OS8 Mouse Pad NOS

$26.99



Apple Power Macintosh G4 Vintage Mac M5183 PowerPC 7400 768MB RAM NO HDD/OS picture

Apple Power Macintosh G4 Vintage Mac M5183 PowerPC 7400 768MB RAM NO HDD/OS

$94.99



Micro miniature vintage Macintosh style computer collector or dollhouse  picture

Micro miniature vintage Macintosh style computer collector or dollhouse

$24.99



Working Vintage Apple M2453 iBook G3 Clamshell Blueberry  RAM Mac OS 9 picture

Working Vintage Apple M2453 iBook G3 Clamshell Blueberry RAM Mac OS 9

$230.00



Apple .mac Box Vintage picture

Apple .mac Box Vintage

$4.99



Apple | Macintosh Performa 200 | Vintage Personal Computer | Beige Casing picture

Apple | Macintosh Performa 200 | Vintage Personal Computer | Beige Casing

$199.95



Apple Macintosh Classic Vintage Computer M0420 from 1991 For Parts Or Repair  picture

Apple Macintosh Classic Vintage Computer M0420 from 1991 For Parts Or Repair

$90.00



Discussions

No Discussions have been posted on this vulnerability.