Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in sarg
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in sarg
ID: MDVSA-2008:079
Distribution: Mandriva
Plattformen: Mandriva Multi Network Firewall 2.0, Mandriva 2007.0, Mandriva 2007.1, Mandriva 2008.0
Datum: Do, 27. März 2008, 23:21
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1167
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1168
Applikationen: sarg

Originalnachricht

This is a multi-part message in MIME format...

------------=_1206656492-11275-1798


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2008:079
http://www.mandriva.com/security/
_______________________________________________________________________

Package : sarg
Date : March 27, 2008
Affected: 2007.0, 2007.1, 2008.0, Multi Network Firewall 2.0
_______________________________________________________________________

Problem Description:

A stack-based buffer overflow in sarg (Squid Analysis Report Generator)
allowed remote attackers to execute arbitrary code via a long Squid
proxy server User-Agent header (CVE-2008-1167).

A cross-site scripting vulnerability in sarg version 2.x prior to
2.2.5 allowed remote attackers to inject arbitrary web script or
HTML via the User-Agent heder, which is not properly handled when
displaying the Squid proxy log (CVE-2008-1168).

In addition, a number of other fixes have been made such as making
the getword() function more robust which should prevent any overflows,
other segfaults have been fixed, and the useragent report is now more
consistent with the other reports.

The updated packages have been patched to correct these issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1167
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1168
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.0:
58e1392f51ac7b5a9448cf115ebdb873 2007.0/i586/sarg-2.2.5-0.2mdv2007.0.i586.rpm

f371cca6116e77d468cc2448411e519d 2007.0/SRPMS/sarg-2.2.5-0.2mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
c0653588b531b967a14060d798fbead5
2007.0/x86_64/sarg-2.2.5-0.2mdv2007.0.x86_64.rpm
f371cca6116e77d468cc2448411e519d 2007.0/SRPMS/sarg-2.2.5-0.2mdv2007.0.src.rpm

Mandriva Linux 2007.1:
df54b85b57812799134352f39b0d33da 2007.1/i586/sarg-2.2.5-0.2mdv2007.1.i586.rpm

13ab13a2899555be0a75424baa334374 2007.1/SRPMS/sarg-2.2.5-0.2mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
784c6b0bb36ca30853d0c1ccbb26cb8f
2007.1/x86_64/sarg-2.2.5-0.2mdv2007.1.x86_64.rpm
13ab13a2899555be0a75424baa334374 2007.1/SRPMS/sarg-2.2.5-0.2mdv2007.1.src.rpm

Mandriva Linux 2008.0:
3cd060eaef73255b0252529ea80f4873 2008.0/i586/sarg-2.2.5-0.2mdv2008.0.i586.rpm

695d91f0647d0097047e14abb09df4f5 2008.0/SRPMS/sarg-2.2.5-0.2mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
cf17fe2e63bcd5afb2b274ae8164892b
2008.0/x86_64/sarg-2.2.5-0.2mdv2008.0.x86_64.rpm
695d91f0647d0097047e14abb09df4f5 2008.0/SRPMS/sarg-2.2.5-0.2mdv2008.0.src.rpm

Multi Network Firewall 2.0:
b64d9f675b66d14ee65541156d28b052 mnf/2.0/i586/sarg-2.2.5-0.1.M20mdk.i586.rpm
3d6ffd13a3be1adefcf4e34f06aba0f2 mnf/2.0/SRPMS/sarg-2.2.5-0.1.M20mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFH6/FVmqjQ0CJFipgRAmyGAKCIzdfjmx2eaZ8bH6RD0FD97nM+vQCeM59D
L5rFowu3o0IAq2VpYhP79FI=
=ZXoh
-----END PGP SIGNATURE-----


------------=_1206656492-11275-1798
Content-Type: text/plain; name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1206656492-11275-1798--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung