[SECURITY] [DSA 724-1] New phpsysinfo packages fix cross site scripting

From: Martin Schulze (joey_at_infodrom.org)
Date: 05/18/05

  • Next message: Martin Pitt: "[USN-127-1] bzip2 vulnerabilities"
    Date: Wed, 18 May 2005 16:47:12 +0200 (CEST)
    To: bugtraq@securityfocus.com

    Hash: SHA1

    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 724-1 security@debian.org
    http://www.debian.org/security/ Martin Schulze
    May 18th, 2005 http://www.debian.org/security/faq
    - --------------------------------------------------------------------------

    Package : phpsysinfo
    Vulnerability : design flaw
    Problem-Type : remote
    Debian-specific: no
    CVE ID : CAN-2005-0870
    Debian Bug : 301118

    Maksymilian Arciemowicz discoverd several cross site scripting issues
    in phpsysinfo, a PHP based host information application.

    For the stable distribution (woody) these problems have been fixed in
    version 2.0-3woody2.

    For the testing (sarge) and unstable (sid) distribution these problems
    have been fixed in version 2.3-3.

    We recommend that you upgrade your phpsysinfo package.

    Upgrade Instructions
    - --------------------

    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.

    If you are using the apt-get package manager, use the line for
    sources.list as given below:

    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages

    You may use an automated update by adding the resources from the
    footer to the proper configuration.

    Debian GNU/Linux 3.0 alias woody
    - --------------------------------

      Source archives:

          Size/MD5 checksum: 622 bc59ec24d7ef4b8b1c0e17cd7753fa19
          Size/MD5 checksum: 2765 a6933aed26ea8425379b37b2ae7c8ba8
          Size/MD5 checksum: 48104 abd184ebc003aeba07d9945bb9c6ff0f

      Architecture independent components:

          Size/MD5 checksum: 42256 f714e679fc08c95a2bdada5c4371f07c

      These files will probably be moved into the stable distribution on
      its next update.

    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: debian-security-announce@lists.debian.org
    Package info: `apt-cache show <pkg>' and http://packages.debian.org/>

    Version: GnuPG v1.4.1 (GNU/Linux)

    -----END PGP SIGNATURE-----

  • Next message: Martin Pitt: "[USN-127-1] bzip2 vulnerabilities"