The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[SECURITY] [DSA 1374-1] New jffnms packages fix several vulnerabilities


<< Previous INDEX Search src / Print Next >>
Date: Tue, 11 Sep 2007 19:57:54 +0100
From: Steve Kemp <skx@debian.org.>
Subject: [SECURITY] [DSA 1374-1] New jffnms packages fix several vulnerabilities
Priority: urgent
Resent-Message-ID: <tbSBhB.A.IZB.wNu5GB@murphy.>
Reply-To: [email protected]
Mail-Followup-To: [email protected]
To: [email protected]
Resent-Date: Tue, 11 Sep 2007 18:50:24 +0000 (UTC)
Resent-From: [email protected] (Mailing List Manager)
X-Virus-Scanned: antivirus-gw at tyumen.ru

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


- ------------------------------------------------------------------------
Debian Security Advisory DSA 1374-1                  [email protected]
http://www.debian.org/security/                               Steve Kemp
September 11, 2007                    http://www.debian.org/security/faq
- ------------------------------------------------------------------------


Package        : jffnms
Vulnerability  : several vulnerabilities
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2007-3189, CVE-2007-3190, CVE-2007-3191

Several vulnerabilities have been discovered in jffnms, a web-based
Network Management System for IP networks.  The Common Vulnerabilities
and Exposures project identifies the following problems:

CVE-2007-3189

    Cross-site scripting (XSS) vulnerability in auth.php, which allows
    a remote attacker to inject arbitrary web script or HTML via the
    user parameter.


CVE-2007-3190

    Multiple SQL injection vulnerabilities in auth.php, which allow 
    remote attackers to execute arbitrary SQL commands via the
    user and password parameters.


CVE-2007-3192

    Direct requests to URLs make it possible for remote attackers to
    access configuration information, bypassing login restrictions.


For the stable distribution (etch), these problems have been fixed in version
0.8.3dfsg.1-2.1etch1

For the unstable distribution (sid), these problems have been fixed in
version 0.8.3dfsg.1-4.

We recommend that you upgrade your jffnms package.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Source archives:

  http://security.debian.org/pool/updates/main/j/jffnms/jffnms_0.8.3dfsg.1.orig.tar.gz
    Size/MD5 checksum:   547656 6be7ef656cf0eea1d133a0bc71a4bba2
  http://security.debian.org/pool/updates/main/j/jffnms/jffnms_0.8.3dfsg.1-2.1etch1.dsc
    Size/MD5 checksum:      609 7a46a6cdefe38535235aa87dd8e6279c
  http://security.debian.org/pool/updates/main/j/jffnms/jffnms_0.8.3dfsg.1-2.1etch1.diff.gz
    Size/MD5 checksum:    76283 cf3fd349e3012b93a4d20711730b26f6

Architecture independent packages:

  http://security.debian.org/pool/updates/main/j/jffnms/jffnms_0.8.3dfsg.1-2.1etch1_all.deb
    Size/MD5 checksum:   550292 94ec8551e3eaa20ae277a5aab47043ee


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: [email protected]
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<;pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)


iD8DBQFG5uT5wM/Gs81MDZ0RAmvgAJ9voKojLJmyMF+VaB1B/aJNbbcTdwCfa/30
75t+GVJbnAqEuMHkj3xYZgQ=
=yEl5
-----END PGP SIGNATURE-----



<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру