Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA899] DSA-899-1 egroupware


Vulnerability Assessment Details

[DSA899] DSA-899-1 egroupware

Vulnerability Assessment Summary
DSA-899-1 egroupware

Detailed Explanation for this Vulnerability Assessment

Several vulnerabilities have been discovered in egroupware, a
web-based groupware suite. The Common Vulnerabilities and Exposures
project identifies the following problems:
Maksymilian Arciemowicz discovered several cross site scripting
problems in phpsysinfo, which are also present in the imported
version in egroupware and of which not all were fixed in DSA 724.
Alexander Heidenreich discovered a cross-site scripting problem in
the tree view of FUD Forum Bulletin Board Software, which is also
present in egroupware and permits remote attackers to read private
posts via a modified mid parameter.
Christopher Kunz discovered that local variables get overwritten
unconditionally in phpsyinfo, which are also present in
egroupware, and are trusted later, which could lead to the
inclusion of arbitrary files.
Christopher Kunz discovered that user-supplied input is used
unsanitised in phpsyinfo and imported in egroupware, causing a
HTTP Response splitting problem.
The old stable distribution (woody) does not contain egroupware packages.
For the stable distribution (sarge) this problem has been fixed in
version 1.0.0.007-2.dfsg-2sarge4.
For the unstable distribution (sid) this problem has been fixed in
version 1.0.0.009.dfsg-3-3.
We recommend that you upgrade your egroupware packages.


Solution : http://www.debian.org/security/2005/dsa-899
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi

Cables, Connectors


CMD RAMLINK FOR COMMODORE 64 128 -  picture

CMD RAMLINK FOR COMMODORE 64 128 -

$1000.00



Commodore 64 Computer - WORKING, No power supply picture

Commodore 64 Computer - WORKING, No power supply

$80.00



WORKING Commodore 64 C64 In Box Matching SN MINT CONDITION With Manual PSU picture

WORKING Commodore 64 C64 In Box Matching SN MINT CONDITION With Manual PSU

$258.88



Commodore 64 C Vintage Computer For Parts/Repair Computer Only picture

Commodore 64 C Vintage Computer For Parts/Repair Computer Only

$59.99



Commodore 128 Computer With Power Supply, Box, Manual, Powers On, Untested picture

Commodore 128 Computer With Power Supply, Box, Manual, Powers On, Untested

$249.99



commodore 64 computer picture

commodore 64 computer

$95.00



Commodore VIC-20 Personal Color Computer In Box AS-IS/For Parts or repair picture

Commodore VIC-20 Personal Color Computer In Box AS-IS/For Parts or repair

$69.99



Commodore 64/128 AV Adaptor - S-Video Composite & 2ch Audio L/R picture

Commodore 64/128 AV Adaptor - S-Video Composite & 2ch Audio L/R

$16.41



pi1541 Disk Emulator for Commodore -  picture

pi1541 Disk Emulator for Commodore -

$38.95



Commodore 1702 Monitor  Working. Tested picture

Commodore 1702 Monitor Working. Tested

$349.99



Discussions

No Discussions have been posted on this vulnerability.