From: Michael Stone <mstone@klecker.debian.org.>
Date: Wed, 22 Feb 2006 15:40:41 +0100
Subject: [SECURITY] [DSA 980-1] New tutos packages fix multiple vulnerabilities
Priority: urgent
Resent-Message-ID: <Fq1-ZC.A.HTD.qfH_DB@murphy.>
Reply-To: [email protected]
Mail-Followup-To: [email protected]
To: [email protected]
Resent-Date: Wed, 22 Feb 2006 08:40:42 -0600 (CST)
Resent-From: [email protected] (Mailing List Manager)
X-Virus-Scanned: antivirus-gw at tyumen.ru
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Debian Security Advisory DSA 980-1 [email protected]
http://www.debian.org/security/ Moritz Muehlenhoff
February 22nd, 2006 http://www.debian.org/security/faq
- --------------------------------------------------------------------------
Package : tutos
Vulnerability : several
Problem-Type : remote
Debian-specific: no
CVE ID : CVE-2004-2161 CVE-2004-2162
Debian Bug : 318633
Joxean Koret discovered several security problems in tutos, a web-based
team organization software. The Common Vulnerabilities and Exposures Project
identifies the following problems:
CVE-2004-2161
An SQL injection vulnerability allows the execution of SQL commands
through the link_id parameter in file_overview.php.
CVE-2004-2162
Cross-Site-Scripting vulnerabilities in the search function of the
address book and in app_new.php allow the execution of web script
code.
The old stable distribution (woody) does not contain tutos packages.
For the stable distribution (sarge) these problems have been fixed in
version 1.1.20031017-2+1sarge1.
The unstable distribution (sid) does no longer contain tutos packages.
We recommend that you upgrade your tutos package.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/t/tutos/tutos_1.1.20031017-2+1sarge1.dsc
Size/MD5 checksum: 575 7babaefc5a7e57afc2fb421d5829c4cf
http://security.debian.org/pool/updates/main/t/tutos/tutos_1.1.20031017-2+1sarge1.tar.gz
Size/MD5 checksum: 4955293 c9c539f0d5504d69377e326870db18c3
Architecture independent components:
http://security.debian.org/pool/updates/main/t/tutos/tutos_1.1.20031017-2+1sarge1_all.deb
Size/MD5 checksum: 4760050 39bb9b2f3e9655c7060f04a5dac83e09
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: [email protected]
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
iQCVAwUBQ/x14A0hVr09l8FJAQL8JgQAyypfHSIb4USUNyXZ2WLzVrmdHGFW9KbS
xUWFZ9uEkC/AH6i1d/eQ/3Prqy52xHlIIkv5DbLQUg35Q8pxqp+dAZLoU0NrLINv
To0KqtYp/DzZ7Elk0zv9wWDgUiNec2KX7qc2P2BmUZV7KbP4D1XVvEthELXeAgBB
I8Ojlecr83A=
=Chb3
-----END PGP SIGNATURE-----