exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Linux Security Advisory 951-1

Debian Linux Security Advisory 951-1
Posted Jan 25, 2006
Authored by Debian | Site debian.org

Several vulnerabilities have been discovered in trac, an enhanced wiki and issue tracking system for software development projects. The Common Vulnerabilities and Exposures project identified the following problems:

tags | advisory, vulnerability
SHA-256 | eea1f4792b9dce39ed16b066bb511324dfa93aa54b14989457397accc5cbf420

Debian Linux Security Advisory 951-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 951-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
January 23rd, 2006 http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package : trac
Vulnerability : missing input sanitising
Problem type : remote
Debian-specific: no
CVE IDs : CVE-2005-4065 CVE-2005-4644
BugTraq IDs : 15720 16198
Debian Bug : 348791

Several vulnerabilies have been discovered in trac, an enhanced wiki
and issue tracking system for software development projects. The
Common Vulnerabilities and Exposures project identifie the following
problems:

CVE-2005-4065

Due to missing input sanitising it is possible to inject arbitrary
SQL code into the SQL statements.

CVE-2005-4644

A cross-site scripting vulnerability has been discovered that
allows remote attackers to inject arbitrary web script or HTML.

The old stable distribution (woody) does not contain trac packages.

For the stable distribution (sarge) these problems have been fixed in
version 0.8.1-3sarge3.

For the unstable distribution (sid) these problems have been fixed in
version 0.9.3-1.

We recommend that you upgrade your trac package.


Upgrade Instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

Source archives:

http://security.debian.org/pool/updates/main/t/trac/trac_0.8.1-3sarge3.dsc
Size/MD5 checksum: 656 cb4d61028dc622d02d3b8c0ff858416e
http://security.debian.org/pool/updates/main/t/trac/trac_0.8.1-3sarge3.diff.gz
Size/MD5 checksum: 12672 6dfb5852433afe58057848058005497e
http://security.debian.org/pool/updates/main/t/trac/trac_0.8.1.orig.tar.gz
Size/MD5 checksum: 236791 1b6c44fae90c760074762b73cdc88c8d

Architecture independent components:

http://security.debian.org/pool/updates/main/t/trac/trac_0.8.1-3sarge3_all.deb
Size/MD5 checksum: 198526 c8953db99c9532a6971163c91facedbc


These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFD1J87W5ql+IAeqTIRAnG1AJwJEMl0VM7nDZi6qBI+KTYcnLKH3gCfZiIN
gfCCdPulsshwwxpNRViNsjQ=
=clzs
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close