-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-2013-1                  security@debian.org
http://www.debian.org/security/                       Moritz Muehlenhoff
March 11, 2010                        http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : egroupware
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE Id(s)      : not yet available
Debian Bug     : 573279

Nahuel Grisolia discovered two vulnerabilities in Egroupware, a web-based
groupware suite: Missing input sanitising in the spellchecker integration
may lead to the execution of arbitrary commands and a cross-site scripting
vulnerability was discovered in the login page.

For the stable distribution (lenny), these problems have been fixed in
version 1.4.004-2.dfsg-4.2.

The upcoming stable distribution (squeeze), no longer contains egroupware
packages.

We recommend that you upgrade your egroupware packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

      Size/MD5 checksum:    35229 1da727f1fb571ac148883ff1cd0d270d
      Size/MD5 checksum:     1775 72e364d1bfd007520f004bb62be49caf
      Size/MD5 checksum: 11597406 26012ca8c976dbf4137f5f5c7abcfdaf

Architecture independent packages:

      Size/MD5 checksum:   105886 548e844db769730c4e63a09046d6c6b7
      Size/MD5 checksum:   334336 a8b1b304c76b0ce2ba07aef4d979ee2a
      Size/MD5 checksum:   569314 ec321c8c1032fc5d563857d600f96667
      Size/MD5 checksum:    41450 047af44eef33721e3e5600e2433d0999
      Size/MD5 checksum:   447966 b5a50e6ccbab7586351fccf3dc1dd497
      Size/MD5 checksum:    59252 0c2800cd5998eb8acccd6c4ab11a1f62
      Size/MD5 checksum:   639436 d5a22274257572b18caa7503d9af72ed
      Size/MD5 checksum:    92244 2e26a6b63744204b9e14944ed5ea727f
      Size/MD5 checksum:   201340 f6925e13cba379934ee0498f92fc4596
      Size/MD5 checksum:     7738 682ddfca5073843b6f30298050762393
      Size/MD5 checksum:    79552 629ded68172377ab350135900faaa251
      Size/MD5 checksum:    69932 36654d065e20e04eaf39a108b94c6f43
      Size/MD5 checksum:   171686 45d61216c4a2a2e7cc9dcfbc71b19e2e
      Size/MD5 checksum:   136528 85bef627512808e873cbd25040d6deaf
      Size/MD5 checksum:   627560 0dc27f321b2a075b44e54fe12c6fb428
      Size/MD5 checksum:   143912 85d374aed2b1f462223c93cf13c1eb4b
      Size/MD5 checksum:  4409348 03bf3cfab8fc4a8ccc34848551682d2e
      Size/MD5 checksum:   273950 1aae22abbbab84bbc36713a7b2d7f9bb
      Size/MD5 checksum:    89532 6e47505d8098b4e7b5e9e9b7c4c0eafa
      Size/MD5 checksum:   119642 fabc08c73db4681e36b723719c5c2d66
      Size/MD5 checksum:    27324 721b208efa3421232f30d809934aaf43
      Size/MD5 checksum:   309896 2870dbd2fee65e5e16234483618566c1
      Size/MD5 checksum:    67108 cbd37f7f1767cc185989dd4c9feb8ea4
      Size/MD5 checksum:    34710 8dc500ad3fb1908439939f8474a69670
      Size/MD5 checksum:   591664 71964dae44c79067d1032554d48fe48d


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp:  dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/

Debian: DSA-2013-1: New egroupware packages fix several vulnerabilities

March 11, 2010
Nahuel Grisolia discovered two vulnerabilities in Egroupware, a web-based groupware suite: Missing input sanitising in the spellchecker integration may lead to the execution of arb...

Summary

Nahuel Grisolia discovered two vulnerabilities in Egroupware, a web-based
groupware suite: Missing input sanitising in the spellchecker integration
may lead to the execution of arbitrary commands and a cross-site scripting
vulnerability was discovered in the login page.

For the stable distribution (lenny), these problems have been fixed in
version 1.4.004-2.dfsg-4.2.

The upcoming stable distribution (squeeze), no longer contains egroupware
packages.

We recommend that you upgrade your egroupware packages.

Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 5.0 alias lenny

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

Size/MD5 checksum: 35229 1da727f1fb571ac148883ff1cd0d270d
Size/MD5 checksum: 1775 72e364d1bfd007520f004bb62be49caf
Size/MD5 checksum: 11597406 26012ca8c976dbf4137f5f5c7abcfdaf

Architecture independent packages:

Size/MD5 checksum: 105886 548e844db769730c4e63a09046d6c6b7
Size/MD5 checksum: 334336 a8b1b304c76b0ce2ba07aef4d979ee2a
Size/MD5 checksum: 569314 ec321c8c1032fc5d563857d600f96667
Size/MD5 checksum: 41450 047af44eef33721e3e5600e2433d0999
Size/MD5 checksum: 447966 b5a50e6ccbab7586351fccf3dc1dd497
Size/MD5 checksum: 59252 0c2800cd5998eb8acccd6c4ab11a1f62
Size/MD5 checksum: 639436 d5a22274257572b18caa7503d9af72ed
Size/MD5 checksum: 92244 2e26a6b63744204b9e14944ed5ea727f
Size/MD5 checksum: 201340 f6925e13cba379934ee0498f92fc4596
Size/MD5 checksum: 7738 682ddfca5073843b6f30298050762393
Size/MD5 checksum: 79552 629ded68172377ab350135900faaa251
Size/MD5 checksum: 69932 36654d065e20e04eaf39a108b94c6f43
Size/MD5 checksum: 171686 45d61216c4a2a2e7cc9dcfbc71b19e2e
Size/MD5 checksum: 136528 85bef627512808e873cbd25040d6deaf
Size/MD5 checksum: 627560 0dc27f321b2a075b44e54fe12c6fb428
Size/MD5 checksum: 143912 85d374aed2b1f462223c93cf13c1eb4b
Size/MD5 checksum: 4409348 03bf3cfab8fc4a8ccc34848551682d2e
Size/MD5 checksum: 273950 1aae22abbbab84bbc36713a7b2d7f9bb
Size/MD5 checksum: 89532 6e47505d8098b4e7b5e9e9b7c4c0eafa
Size/MD5 checksum: 119642 fabc08c73db4681e36b723719c5c2d66
Size/MD5 checksum: 27324 721b208efa3421232f30d809934aaf43
Size/MD5 checksum: 309896 2870dbd2fee65e5e16234483618566c1
Size/MD5 checksum: 67108 cbd37f7f1767cc185989dd4c9feb8ea4
Size/MD5 checksum: 34710 8dc500ad3fb1908439939f8474a69670
Size/MD5 checksum: 591664 71964dae44c79067d1032554d48fe48d


These files will probably be moved into the stable distribution on
its next update.

For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/

Severity
Package : egroupware
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE Id(s) : not yet available
Debian Bug : 573279

Related News