[Full-disclosure] [ MDVSA-2009:291 ] jetty5




-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2009:291
http://www.mandriva.com/security/
_______________________________________________________________________

Package : jetty5
Date : October 29, 2009
Affected: 2009.0, 2009.1
_______________________________________________________________________

Problem Description:

A vulnerability has been identified and corrected in jetty5:

Directory traversal vulnerability in the HTTP server in Mort Bay
Jetty before 6.1.17, and 7.0.0.M2 and earlier 7.x versions, allows
remote attackers to access arbitrary files via directory traversal
sequences in the URI (CVE-2009-1523).

This update fixes this vulnerability.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1523
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2009.0:
0383668f255e58ef23b7a14826b599ad 2009.0/i586/jetty5-5.1.15-0.1.5.1.1mdv2009.0.noarch.rpm
a25c49131e3bd76bfb5d77ae71e6d4cd 2009.0/i586/jetty5-demo-5.1.15-0.1.5.1.1mdv2009.0.noarch.rpm
18696108b6bf58159691ab9121fd4a5d 2009.0/i586/jetty5-javadoc-5.1.15-0.1.5.1.1mdv2009.0.noarch.rpm
2f59ece66ab44dc2487748ad28afd073 2009.0/i586/jetty5-manual-5.1.15-0.1.5.1.1mdv2009.0.noarch.rpm
a82134c5cda0e03fb88fcd43e9ea7e5e 2009.0/SRPMS/jetty5-5.1.15-0.1.5.1.1mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64:
60cb1f718ab38af98109f7c217659f9c 2009.0/x86_64/jetty5-5.1.15-0.1.5.1.1mdv2009.0.noarch.rpm
7e7f6c24c16742c1ad487e6138d59eda 2009.0/x86_64/jetty5-demo-5.1.15-0.1.5.1.1mdv2009.0.noarch.rpm
1f2d86fa1a8e6c3bb552e93ed859df8b 2009.0/x86_64/jetty5-javadoc-5.1.15-0.1.5.1.1mdv2009.0.noarch.rpm
3a09429ba206b9a20b52c5305890d10d 2009.0/x86_64/jetty5-manual-5.1.15-0.1.5.1.1mdv2009.0.noarch.rpm
a82134c5cda0e03fb88fcd43e9ea7e5e 2009.0/SRPMS/jetty5-5.1.15-0.1.5.1.1mdv2009.0.src.rpm

Mandriva Linux 2009.1:
edd6d75064239e5b464ce3c8d3bd4f11 2009.1/i586/jetty5-5.1.15-0.1.5.1.1mdv2009.1.noarch.rpm
bea3de0cfc1a7bc0eaaa49cfc6ccedcd 2009.1/i586/jetty5-demo-5.1.15-0.1.5.1.1mdv2009.1.noarch.rpm
7a8ecc3f64392effa30b9a0d951500e8 2009.1/i586/jetty5-javadoc-5.1.15-0.1.5.1.1mdv2009.1.noarch.rpm
54be60e18734624c82cd655de0f04348 2009.1/i586/jetty5-manual-5.1.15-0.1.5.1.1mdv2009.1.noarch.rpm
72b1ac196e64288be9e56b06b3244456 2009.1/SRPMS/jetty5-5.1.15-0.1.5.1.1mdv2009.1.src.rpm

Mandriva Linux 2009.1/X86_64:
c7870c4f26c91cde3336736a60270129 2009.1/x86_64/jetty5-5.1.15-0.1.5.1.1mdv2009.1.noarch.rpm
ee02ab410a5df20e880ffaa9376dd53c 2009.1/x86_64/jetty5-demo-5.1.15-0.1.5.1.1mdv2009.1.noarch.rpm
37481f18658029037994197bcfe6b16a 2009.1/x86_64/jetty5-javadoc-5.1.15-0.1.5.1.1mdv2009.1.noarch.rpm
c61d5d31d916d8cf29be3793269d79ab 2009.1/x86_64/jetty5-manual-5.1.15-0.1.5.1.1mdv2009.1.noarch.rpm
72b1ac196e64288be9e56b06b3244456 2009.1/SRPMS/jetty5-5.1.15-0.1.5.1.1mdv2009.1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFK6ci5mqjQ0CJFipgRAl8kAJ4pNWlsBcFaSFS84Dag8sDKly9ELgCgnw1a
djZoHMeblkdE+5RECgQRqNo=
=cxEg
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Relevant Pages

  • [Full-disclosure] [ MDVSA-2010:073-1 ] cups
    ... Use-after-free vulnerability in the abstract file-descriptor handling ... scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers ... The updated packages have been patched to correct these issues. ... Packages for Mandriva Linux 2010.0 was missing with ...
    (Full-Disclosure)
  • [ MDVSA-2010:073-1 ] cups
    ... Use-after-free vulnerability in the abstract file-descriptor handling ... scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers ... The updated packages have been patched to correct these issues. ... Packages for Mandriva Linux 2010.0 was missing with ...
    (Bugtraq)
  • [Full-disclosure] [ MDVSA-2010:084 ] java-1.6.0-openjdk
    ... Multiple Java OpenJDK security vulnerabilities has been identified ... CMM readMabCurveData Buffer Overflow Vulnerability. ... Packages for 2009.0 are provided due to the Extended Maintenance ... Mandriva Linux 2009.0/X86_64: ...
    (Full-Disclosure)
  • [ MDVSA-2010:084 ] java-1.6.0-openjdk
    ... Multiple Java OpenJDK security vulnerabilities has been identified ... CMM readMabCurveData Buffer Overflow Vulnerability. ... Packages for 2009.0 are provided due to the Extended Maintenance ... Mandriva Linux 2009.0/X86_64: ...
    (Bugtraq)
  • [Full-disclosure] [ MDKSA-2007:079-1 ] - Updated xorg-x11/XFree86 packages fix i
    ... Local exploitation of a memory corruption vulnerability in the X.Org ... Updated packages are patched to address these issues. ... Packages for Mandriva Linux 2007.1 are now available. ...
    (Full-Disclosure)