Summary: | net-analyzer/cacti < 0.8.7b multiple vulnerabilities (CVE-2008-{0783,0784,0785,0786}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Pierre-Yves Rofes (RETIRED) <py> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | netmon |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://secunia.com/advisories/28872/ | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Pierre-Yves Rofes (RETIRED)
2008-02-12 20:46:19 UTC
netmon, please bump as necessary. Thank you, Pierre-Yves, for report 0.8.6j-r8, 0.8.7a-r2, 0.8.7b are fixed versions in the tree. Stabilization is required only for 0.8.6j-r8. 0.8.6k was not added as there is no upstream provided upgrade path to 0.8.7 branch. I would like to stabilize only 0.8.6j-r8 and keep 0.8.7* unstable until I'll manage to find answers to problems which appeared in 0.8.7b (not critical but I'd like to fix that or warn users appropriately). Also I'd like to see 0.8.7 branch stable together with cacti-spine. So, do not stabilize 0.8.7. Give me another week :) Thx Peter. Arches please test and mark stable. Target keywords are: cacti-0.8.6j-r8.ebuild:KEYWORDS="alpha amd64 ~hppa ppc ppc64 sparc x86" x86 stable ppc64 stable alpha/sparc stable ppc stable amd64 stable Steev, while stabilization of cacti-0.8.7b is a generally good thing (appropriate bug is filled), please, stabilize 0.8.6j-r8 too. Thank you. (In reply to comment #9) > Steev, while stabilization of cacti-0.8.7b is a generally good thing > (appropriate bug is filled), please, stabilize 0.8.6j-r8 too. Thank you. > sorry, fixed This one is ready for GLSA vote. I vote YES. Fixed in release snapshot. YES, filed. CVE-2008-0783 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0783): Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.7 before 0.8.7b and 0.8.6 before 0.8.6k allow remote attackers to inject arbitrary web script or HTML via the (1) view_type parameter to graph.php, (2) filter parameter to graph_view.php, and (3) action and login_username parameters to index.php/login. CVE-2008-0784 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0784): graph.php in Cacti 0.8.7 before 0.8.7b and 0.8.6 before 0.8.6k allows remote attackers to obtain the full path via an invalid local_graph_id parameter and other unspecified vectors. CVE-2008-0785 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0785): Multiple SQL injection vulnerabilities in Cacti 0.8.7 before 0.8.7b and 0.8.6 before 0.8.6k allow remote authenticated users to execute arbitrary SQL commands via the (1) graph_list parameter to graph_view.php, (2) leaf_id and id parameters to tree.php, (3) local_graph_id parameter to graph_xport.php, and (4) login_username parameter to index.php/login. CVE-2008-0786 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0786): CRLF injection vulnerability in Cacti 0.8.7 before 0.8.7b and 0.8.6 before 0.8.6k, when running on older PHP interpreters, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors. GLSA 200803-18 |