Debian: New horde3 packages fix information disclosure
Debian: New horde3 packages fix information disclosure
It was discovered that the Horde web application framework permits arbitrary
file inclusion by a remote attacker through the theme preference parameter.
- ------------------------------------------------------------------------ Debian Security Advisory DSA-1519-1 This email address is being protected from spambots. You need JavaScript enabled to view it. https://www.debian.org/security/ Thijs Kinkhorst March 15, 2008 https://www.debian.org/security/faq - ------------------------------------------------------------------------ Package : horde3 Vulnerability : insufficient input sanitising Problem type : remote Debian-specific: no CVE Id(s) : CVE-2008-1284 Debian Bug : 470640 It was discovered that the Horde web application framework permits arbitrary file inclusion by a remote attacker through the theme preference parameter. The old stable distribution (sarge) this problem has been fixed in version 3.0.4-4sarge7. For the stable distribution (etch) this problem has been fixed in version 3.1.3-4etch3. For the unstable distribution (sid) this problem has been fixed in version 3.1.7-1. We recommend that you upgrade your horde3 package. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: https://security.debian.org/pool/updates/main/h/horde3/horde3_3.0.4-4sarge7.dsc Size/MD5 checksum: 920 b3374347290398c40e95d94ca72f089c https://security.debian.org/pool/updates/main/h/horde3/horde3_3.0.4.orig.tar.gz Size/MD5 checksum: 3378143 e2221d409ba1c8841ce4ecee981d7b61 https://security.debian.org/pool/updates/main/h/horde3/horde3_3.0.4-4sarge7.diff.gz Size/MD5 checksum: 14280 01c1df81c247bf310367f50859ebb2ff Architecture independent packages: https://security.debian.org/pool/updates/main/h/horde3/horde3_3.0.4-4sarge7_all.deb Size/MD5 checksum: 3437956 4c4fa0aa9f5347785ca74f414165f934 Debian GNU/Linux 4.0 alias etch - ------------------------------- Source archives: https://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3-4etch3.diff.gz Size/MD5 checksum: 13100 d79fbe74794a4f6c70f208ba3a55bebc https://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3-4etch3.dsc Size/MD5 checksum: 974 f8929682acb675550e4235c62a99cbe6 https://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3.orig.tar.gz Size/MD5 checksum: 5232958 fbc56c608ac81474b846b1b4b7bb5ee7 Architecture independent packages: https://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3-4etch3_all.deb Size/MD5 checksum: 5270328 d4a9a4db3744a2cd496ed499c39ec6b3 These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb https://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.