Linux Security
    Linux Security
    Linux Security

    Debian: DSA-2039-1: New cacti packages fix missing input sanitising

    Date 23 Apr 2010
    124
    Posted By LinuxSecurity Advisories
    It was discovered that Cacti, a frontend to rrdtool for monitoring systems and services missed input sanitising, making an SQL injection attack possible.
    
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-2039-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                          Thijs Kinkhorst
    April 23, 2010                        https://www.debian.org/security/faq
    - ------------------------------------------------------------------------
    
    Package        : cacti
    Vulnerability  : missing input sanitising
    Problem type   : remote
    Debian-specific: no
    Debian Bug     : 578909
    
    It was discovered that Cacti, a frontend to rrdtool for monitoring
    systems and services missed input sanitising, making an SQL injection
    attack possible.
    
    For the stable distribution (lenny), this problem has been fixed in
    version 0.8.7b-2.1+lenny2.
    
    For the unstable distribution (sid), this problem will be fixed soon.
    
    We recommend that you upgrade your cacti package.
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    Debian GNU/Linux 5.0 alias lenny
    - --------------------------------
    
    Source archives:
    
      https://security.debian.org/pool/updates/main/c/cacti/cacti_0.8.7b-2.1+lenny2.diff.gz
        Size/MD5 checksum:    37338 16b43e80a447a185f5372372836104ed
      https://security.debian.org/pool/updates/main/c/cacti/cacti_0.8.7b.orig.tar.gz
        Size/MD5 checksum:  1972444 aa8a740a6ab88e3634b546c3e1bc502f
      https://security.debian.org/pool/updates/main/c/cacti/cacti_0.8.7b-2.1+lenny2.dsc
        Size/MD5 checksum:     1408 468d418ebedfd326081cbb159c159b55
    
    Architecture independent packages:
    
      https://security.debian.org/pool/updates/main/c/cacti/cacti_0.8.7b-2.1+lenny2_all.deb
        Size/MD5 checksum:  1826020 b88356b2559091ae8444b93b5234e881
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb https://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and https://packages.debian.org/
    

    LinuxSecurity Poll

    No results found.

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.