-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 1130-1 security@debian.org http://www.debian.org/security/ Martin Schulze July 30th, 2006 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : sitebar Vulnerability : missing input validation Problem type : remote Debian-specific: no CVE ID : CVE-2006-3320 BugTraq ID : 18680 Debian Bug : 377299 A a cross-site scripting vulnerability has been discovered in sitebar, a web based bookmark manager written in PHP, which allows remote attackers to inject arbitrary web script or HTML. For the stable distribution (sarge) this problem has been fixed in version 3.2.6-7.1. For the unstable distribution (sid) this problem has been fixed in version 3.3.8-1.1. We recommend that you upgrade your sitebar package. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/s/sitebar/sitebar_3.2.6-7.1.dsc Size/MD5 checksum: 567 af6299567258255742c9289ead8618e4 http://security.debian.org/pool/updates/main/s/sitebar/sitebar_3.2.6-7.1.diff.gz Size/MD5 checksum: 9214 2309667ac14ea821c7a1ba14b8a59916 http://security.debian.org/pool/updates/main/s/sitebar/sitebar_3.2.6.orig.tar.gz Size/MD5 checksum: 333352 a86243f7a70a1a9ac80342fbcca14297 Architecture independent components: http://security.debian.org/pool/updates/main/s/sitebar/sitebar_3.2.6-7.1_all.deb Size/MD5 checksum: 339760 98d388ce2b2c8d746d333f6286e22c0b These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show ' and http://packages.debian.org/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.3 (GNU/Linux) iD8DBQFEz2z0W5ql+IAeqTIRAnRrAJ9IALHV10MpVab3Fflkmfx82mfCngCeLHCd oXpZb7Bj2WJkHIec2iIadfs= =2c7k -----END PGP SIGNATURE-----