|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA899] DSA-899-1 egroupware Vulnerability Assessment Details
|
[DSA899] DSA-899-1 egroupware |
||
DSA-899-1 egroupware Detailed Explanation for this Vulnerability Assessment Several vulnerabilities have been discovered in egroupware, a web-based groupware suite. The Common Vulnerabilities and Exposures project identifies the following problems: Maksymilian Arciemowicz discovered several cross site scripting problems in phpsysinfo, which are also present in the imported version in egroupware and of which not all were fixed in DSA 724. Alexander Heidenreich discovered a cross-site scripting problem in the tree view of FUD Forum Bulletin Board Software, which is also present in egroupware and permits remote attackers to read private posts via a modified mid parameter. Christopher Kunz discovered that local variables get overwritten unconditionally in phpsyinfo, which are also present in egroupware, and are trusted later, which could lead to the inclusion of arbitrary files. Christopher Kunz discovered that user-supplied input is used unsanitised in phpsyinfo and imported in egroupware, causing a HTTP Response splitting problem. The old stable distribution (woody) does not contain egroupware packages. For the stable distribution (sarge) this problem has been fixed in version 1.0.0.007-2.dfsg-2sarge4. For the unstable distribution (sid) this problem has been fixed in version 1.0.0.009.dfsg-3-3. We recommend that you upgrade your egroupware packages. Solution : http://www.debian.org/security/2005/dsa-899 Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi |
||
Cables, Connectors |
CMD RAMLINK FOR COMMODORE 64 128 -
$1000.00
Commodore 64 Computer - WORKING, No power supply
$80.00
WORKING Commodore 64 C64 In Box Matching SN MINT CONDITION With Manual PSU
$258.88
Commodore 64 C Vintage Computer For Parts/Repair Computer Only
$59.99
Commodore 128 Computer With Power Supply, Box, Manual, Powers On, Untested
$249.99
$95.00
Commodore VIC-20 Personal Color Computer In Box AS-IS/For Parts or repair
$69.99
Commodore 64/128 AV Adaptor - S-Video Composite & 2ch Audio L/R
$16.41
pi1541 Disk Emulator for Commodore -
$38.95
Commodore 1702 Monitor Working. Tested
$349.99
|
||
No Discussions have been posted on this vulnerability. |