Linux Security
Linux Security
Linux Security

Debian: New phproupware packages fix several vulnerabilities

Date 02 Sep 2005
Posted By LinuxSecurity Advisories
Updated package.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 798-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
September 2nd, 2005           
- --------------------------------------------------------------------------

Package        : phpgroupware
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2005-2498 CAN-2005-2600 CAN-2005-2761

Several vulnerabilities have been discovered in phpgroupware, a web
based groupware system written in PHP.  The Common Vulnerabilities and
Exposures project identifies the following problems:


    Stefan Esser discovered another vulnerability in the XML-RPC
    libraries that allows injection of arbitrary PHP code into eval()
    statements.  The XMLRPC component has been disabled.


    Alexander Heidenreich discovered a cross-site scriptiong problem
    in the tree view of FUD Forum Bulletin Board Software, which is
    also present in phpgroupware.


    A global cross-site scripting fix has also been included that
    protects against potential malicious scripts embedded in CSS and
    xmlns in various parts of the application and modules.

This update also contains a postinst bugfix that has been approved for
the next update to the stable release.

For the old stable distribution (woody) these problems don't apply.

For the stable distribution (sarge) these problems have been fixed in

For the unstable distribution (sid) these problems have been fixed in

We recommend that you upgrade your phpgroupware packages.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:     1665 e10b74698fb0ccd70d9960c4e9745224
      Size/MD5 checksum:    36212 ce2653530ea7790676d68687ac9ab89a
      Size/MD5 checksum: 19442629 5edd5518e8f77174c12844f9cfad6ac4

  Architecture independent components:
      Size/MD5 checksum:   176408 e62845031a7af8182d876d93ce3a653d
      Size/MD5 checksum:   186202 70608b587089d644a3c2ff787f6ef3a0
      Size/MD5 checksum:   100830 97695db70fdda862347531f7b22b40cd
      Size/MD5 checksum:   323858 db8259d262257e59a620113a97dc5a75
      Size/MD5 checksum:    23068 57ecbc9bed7823851eef44102e59e36d
      Size/MD5 checksum:   434086 f8c1e175ab1b1dc0b337ca47f3670f30
      Size/MD5 checksum:     6388 690fb88e32c50d3d00f440362c27dc78
      Size/MD5 checksum:    33196 dab4c5133ea41f23a8752d93e8bd9786
      Size/MD5 checksum:    42654 9db6fec8e4687d8fe6099a467a8246db
      Size/MD5 checksum:    50302 f4aeb63d1aeaa72c2bbfa6a5c0f8f247
      Size/MD5 checksum:  1117628 e467218f15060c0edbabaa85cc6d561e
      Size/MD5 checksum:  1329298 95e88686c6212b6b1fcbfe404aef76ea
      Size/MD5 checksum:   180022 5930fda4d00b9814600dd3164243e678
      Size/MD5 checksum:    91478 d2bd73cc22569c599fcadbedcfe1abb6
      Size/MD5 checksum:   166208 3b310fc7dedb0c055e1bbb451b61edd8
      Size/MD5 checksum:    45422 37e0f53559aa145decf9ee82906f6225
      Size/MD5 checksum:    36296 e196baee2c1c89fc3872ea91b4046845
      Size/MD5 checksum:  1355378 5453aa07a4c4372f247a994d7122170d
      Size/MD5 checksum:    63786 533a084f5b12d9471fd0bf8e7eb471a1
      Size/MD5 checksum:    18712 feaa03f55c431cb7265c98dd5ea3ccbb
      Size/MD5 checksum:     8472 4595ab292c8139cbe4596754403a471a
      Size/MD5 checksum:   136256 9f5270506681b88bc7b55c459e7c6ab6
      Size/MD5 checksum:    90472 8a82ed20e8bb22e098610bf988338966
      Size/MD5 checksum:    25864 fe33aebc1fe6887b3a36624139216092
      Size/MD5 checksum:    41170 971b81d589f9ec41661260c666d7b0ac
      Size/MD5 checksum:    46804 749dcf3257343b66b0d866fdfee0a933
      Size/MD5 checksum:    34828 4135f525d65dafde78ab72da65e84ab7
      Size/MD5 checksum:    20566 cca6d535bd572adb89be5337c2ea4081
      Size/MD5 checksum:    40058 e4fd11ffcc187d218e8e761443210de2
      Size/MD5 checksum:  9677508 a2e03ccffbc07f28b7e40610a223173b
      Size/MD5 checksum:   116316 ea045a4a3bc0b30fefa3105d781f1e6b
      Size/MD5 checksum:    31390 42add8aa672fcbad2bc45bcc86de345f
      Size/MD5 checksum:    59496 907318b665a238d7d272125377e786ff
      Size/MD5 checksum:   120176 6d4c7741a3706276da2e67f76ccda644
      Size/MD5 checksum:    23352 8d9360711e849414a9e331b820a06e7e
      Size/MD5 checksum:    29810 c1414f1646c86cc9548cd21091b9402d
      Size/MD5 checksum:   267152 dc7418b235702e20c9c746116a41cd0b
      Size/MD5 checksum:   902332 d18c60e4a310be6a8079659d9edb1ef3
      Size/MD5 checksum:    19062 5c21d71782cb4790f0037ae7358c6366
      Size/MD5 checksum:    23888 001d27f63b54f9a60788b0512f3b0315
      Size/MD5 checksum:    21842 20bdf757aa0ba7d6e7ddd64454af89c5
      Size/MD5 checksum:    50120 825d4e389401fe8d3ed3cc4f5bad71ed
      Size/MD5 checksum:    55662 7594f3210ebd11e91f483aac7cc9c20b
      Size/MD5 checksum:    70170 01379389b829ca8fc81f820df5ba0f76
      Size/MD5 checksum:    62818 303dbc331b9bdab5e476a6dacfe08a87
      Size/MD5 checksum:   156040 b02eea4ffa8eac66bab0e673df7a5afa

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"50","type":"x","order":"1","pct":80.65,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"7","type":"x","order":"2","pct":11.29,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":8.06,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.