Linux Security
    Linux Security
    Linux Security

    Debian: New phproupware packages fix several vulnerabilities

    Date 02 Sep 2005
    Posted By LinuxSecurity Advisories
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 798-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    September 2nd, 2005           
    - --------------------------------------------------------------------------
    Package        : phpgroupware
    Vulnerability  : several
    Problem-Type   : remote
    Debian-specific: no
    CVE ID         : CAN-2005-2498 CAN-2005-2600 CAN-2005-2761
    Several vulnerabilities have been discovered in phpgroupware, a web
    based groupware system written in PHP.  The Common Vulnerabilities and
    Exposures project identifies the following problems:
        Stefan Esser discovered another vulnerability in the XML-RPC
        libraries that allows injection of arbitrary PHP code into eval()
        statements.  The XMLRPC component has been disabled.
        Alexander Heidenreich discovered a cross-site scriptiong problem
        in the tree view of FUD Forum Bulletin Board Software, which is
        also present in phpgroupware.
        A global cross-site scripting fix has also been included that
        protects against potential malicious scripts embedded in CSS and
        xmlns in various parts of the application and modules.
    This update also contains a postinst bugfix that has been approved for
    the next update to the stable release.
    For the old stable distribution (woody) these problems don't apply.
    For the stable distribution (sarge) these problems have been fixed in
    For the unstable distribution (sid) these problems have been fixed in
    We recommend that you upgrade your phpgroupware packages.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
      Source archives:
          Size/MD5 checksum:     1665 e10b74698fb0ccd70d9960c4e9745224
          Size/MD5 checksum:    36212 ce2653530ea7790676d68687ac9ab89a
          Size/MD5 checksum: 19442629 5edd5518e8f77174c12844f9cfad6ac4
      Architecture independent components:
          Size/MD5 checksum:   176408 e62845031a7af8182d876d93ce3a653d
          Size/MD5 checksum:   186202 70608b587089d644a3c2ff787f6ef3a0
          Size/MD5 checksum:   100830 97695db70fdda862347531f7b22b40cd
          Size/MD5 checksum:   323858 db8259d262257e59a620113a97dc5a75
          Size/MD5 checksum:    23068 57ecbc9bed7823851eef44102e59e36d
          Size/MD5 checksum:   434086 f8c1e175ab1b1dc0b337ca47f3670f30
          Size/MD5 checksum:     6388 690fb88e32c50d3d00f440362c27dc78
          Size/MD5 checksum:    33196 dab4c5133ea41f23a8752d93e8bd9786
          Size/MD5 checksum:    42654 9db6fec8e4687d8fe6099a467a8246db
          Size/MD5 checksum:    50302 f4aeb63d1aeaa72c2bbfa6a5c0f8f247
          Size/MD5 checksum:  1117628 e467218f15060c0edbabaa85cc6d561e
          Size/MD5 checksum:  1329298 95e88686c6212b6b1fcbfe404aef76ea
          Size/MD5 checksum:   180022 5930fda4d00b9814600dd3164243e678
          Size/MD5 checksum:    91478 d2bd73cc22569c599fcadbedcfe1abb6
          Size/MD5 checksum:   166208 3b310fc7dedb0c055e1bbb451b61edd8
          Size/MD5 checksum:    45422 37e0f53559aa145decf9ee82906f6225
          Size/MD5 checksum:    36296 e196baee2c1c89fc3872ea91b4046845
          Size/MD5 checksum:  1355378 5453aa07a4c4372f247a994d7122170d
          Size/MD5 checksum:    63786 533a084f5b12d9471fd0bf8e7eb471a1
          Size/MD5 checksum:    18712 feaa03f55c431cb7265c98dd5ea3ccbb
          Size/MD5 checksum:     8472 4595ab292c8139cbe4596754403a471a
          Size/MD5 checksum:   136256 9f5270506681b88bc7b55c459e7c6ab6
          Size/MD5 checksum:    90472 8a82ed20e8bb22e098610bf988338966
          Size/MD5 checksum:    25864 fe33aebc1fe6887b3a36624139216092
          Size/MD5 checksum:    41170 971b81d589f9ec41661260c666d7b0ac
          Size/MD5 checksum:    46804 749dcf3257343b66b0d866fdfee0a933
          Size/MD5 checksum:    34828 4135f525d65dafde78ab72da65e84ab7
          Size/MD5 checksum:    20566 cca6d535bd572adb89be5337c2ea4081
          Size/MD5 checksum:    40058 e4fd11ffcc187d218e8e761443210de2
          Size/MD5 checksum:  9677508 a2e03ccffbc07f28b7e40610a223173b
          Size/MD5 checksum:   116316 ea045a4a3bc0b30fefa3105d781f1e6b
          Size/MD5 checksum:    31390 42add8aa672fcbad2bc45bcc86de345f
          Size/MD5 checksum:    59496 907318b665a238d7d272125377e786ff
          Size/MD5 checksum:   120176 6d4c7741a3706276da2e67f76ccda644
          Size/MD5 checksum:    23352 8d9360711e849414a9e331b820a06e7e
          Size/MD5 checksum:    29810 c1414f1646c86cc9548cd21091b9402d
          Size/MD5 checksum:   267152 dc7418b235702e20c9c746116a41cd0b
          Size/MD5 checksum:   902332 d18c60e4a310be6a8079659d9edb1ef3
          Size/MD5 checksum:    19062 5c21d71782cb4790f0037ae7358c6366
          Size/MD5 checksum:    23888 001d27f63b54f9a60788b0512f3b0315
          Size/MD5 checksum:    21842 20bdf757aa0ba7d6e7ddd64454af89c5
          Size/MD5 checksum:    50120 825d4e389401fe8d3ed3cc4f5bad71ed
          Size/MD5 checksum:    55662 7594f3210ebd11e91f483aac7cc9c20b
          Size/MD5 checksum:    70170 01379389b829ca8fc81f820df5ba0f76
          Size/MD5 checksum:    62818 303dbc331b9bdab5e476a6dacfe08a87
          Size/MD5 checksum:   156040 b02eea4ffa8eac66bab0e673df7a5afa
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"11","type":"x","order":"1","pct":34.38,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":18.75,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":46.88,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.