Secunia Security Advisory - Debian has issued an update for webcalendar. This fixes some vulnerabilities, which can be exploited by malicious users to manipulate certain information and conduct SQL injection attacks, and by malicious people to conduct HTTP response splitting attacks.
402111c7fa7602d31f76a7473fb647464996d6cf403a2e5b44bc38ebcffc68cc
TITLE:
Debian update for webcalendar
SECUNIA ADVISORY ID:
SA19240
VERIFY ADVISORY:
http://secunia.com/advisories/19240/
CRITICAL:
Less critical
IMPACT:
Cross Site Scripting, Manipulation of data
WHERE:
>From remote
OPERATING SYSTEM:
Debian GNU/Linux 3.1
http://secunia.com/product/5307/
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/
DESCRIPTION:
Debian has issued an update for webcalendar. This fixes some
vulnerabilities, which can be exploited by malicious users to
manipulate certain information and conduct SQL injection attacks, and
by malicious people to conduct HTTP response splitting attacks.
For more information:
SA17784
SA17848
SOLUTION:
Apply updated packages.
-- Debian GNU/Linux 3.1 alias sarge --
Source archives:
http://security.debian.org/pool/updates/main/w/webcalendar/webcalendar_0.9.45-4sarge3.dsc
Size/MD5 checksum: 610 a0cd6c66192d6fcb08ad235bab03682f
http://security.debian.org/pool/updates/main/w/webcalendar/webcalendar_0.9.45-4sarge3.diff.gz
Size/MD5 checksum: 11838 01cadcadb69aea8688183bf7093b90e8
http://security.debian.org/pool/updates/main/w/webcalendar/webcalendar_0.9.45.orig.tar.gz
Size/MD5 checksum: 612360 a6a66dc54cd293429b604fe6da7633a6
Architecture independent components:
http://security.debian.org/pool/updates/main/w/webcalendar/webcalendar_0.9.45-4sarge3_all.deb
Size/MD5 checksum: 629166 eebb63997aa535fce008490679d89b3a
-- Debian GNU/Linux unstable alias sid --
Fixed in version 1.0.2-1.
ORIGINAL ADVISORY:
http://www.debian.org/security/2006/dsa-1002
OTHER REFERENCES:
SA17784:
http://secunia.com/advisories/17784/
SA17848:
http://secunia.com/advisories/17848/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------