what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2008-210

Mandriva Linux Security Advisory 2008-210
Posted Oct 11, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - CRLF injection vulnerability in Sys.Web in Mono 2.0 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the query string. The updated packages have been patched to fix the issue. This update was too late for inclusion in Mandriva Linux 2009, so it is being released now for that version.

tags | advisory, remote, web, arbitrary
systems | linux, mandriva
advisories | CVE-2008-3906
SHA-256 | 057cc00fb8f186be7032374de00c42bdc803457f6c45ccb348535206b9dac36b

Mandriva Linux Security Advisory 2008-210

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2008:210-1
http://www.mandriva.com/security/
_______________________________________________________________________

Package : mono
Date : October 11, 2008
Affected: 2009.0
_______________________________________________________________________

Problem Description:

CRLF injection vulnerability in Sys.Web in Mono 2.0 and earlier allows
remote attackers to inject arbitrary HTTP headers and conduct HTTP
response splitting attacks via CRLF sequences in the query string.

The updated packages have been patched to fix the issue.

Update:

This update was too late for inclusion in Mandriva Linux 2009, so it
is being released now for that version.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3906
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2009.0:
b5ba7bb1b0f7588c50591caa1e4ab3ea 2009.0/i586/jay-1.9.1-5.1mdv2009.0.i586.rpm
eb00edeb6619fa7772949af5a77950e4 2009.0/i586/libmono0-1.9.1-5.1mdv2009.0.i586.rpm
93b1136112759fe92dfced587c6c696f 2009.0/i586/libmono-devel-1.9.1-5.1mdv2009.0.i586.rpm
88f6d3376a58a22562a7039397ec71b2 2009.0/i586/mono-1.9.1-5.1mdv2009.0.i586.rpm
f95a80d20ff55acc3789965861a78692 2009.0/i586/mono-bytefx-data-mysql-1.9.1-5.1mdv2009.0.i586.rpm
479d33f14fbf2d7ba980f2b6cdc289c4 2009.0/i586/mono-data-1.9.1-5.1mdv2009.0.i586.rpm
9bb8900a3a0e8f08de71634f24782f49 2009.0/i586/mono-data-firebird-1.9.1-5.1mdv2009.0.i586.rpm
0d78802fcc92a3710bba04f12c505875 2009.0/i586/mono-data-oracle-1.9.1-5.1mdv2009.0.i586.rpm
2a2c1d3e67282e3557bab2b7e9ecbda4 2009.0/i586/mono-data-postgresql-1.9.1-5.1mdv2009.0.i586.rpm
03704c857eec82cdc774037a4d9127ff 2009.0/i586/mono-data-sqlite-1.9.1-5.1mdv2009.0.i586.rpm
33bbef5906d86b8d49103890abc9ed28 2009.0/i586/mono-data-sybase-1.9.1-5.1mdv2009.0.i586.rpm
cec02782ae6674b884be8337b7c360b8 2009.0/i586/mono-doc-1.9.1-5.1mdv2009.0.i586.rpm
2ce320c94c83f8197bc3388f0bb8d2d0 2009.0/i586/mono-extras-1.9.1-5.1mdv2009.0.i586.rpm
be2c17c2ea4d9ecca33d9c88c02ebb24 2009.0/i586/mono-ibm-data-db2-1.9.1-5.1mdv2009.0.i586.rpm
68113f85c87f2fc3d753501615d75c78 2009.0/i586/mono-jscript-1.9.1-5.1mdv2009.0.i586.rpm
9e10cb48c758f1f2626033d906896c26 2009.0/i586/mono-locale-extras-1.9.1-5.1mdv2009.0.i586.rpm
c5e30b0b2a72935643283d378e163a46 2009.0/i586/mono-nunit-1.9.1-5.1mdv2009.0.i586.rpm
62304419db88985dc938e73d02748afd 2009.0/i586/mono-web-1.9.1-5.1mdv2009.0.i586.rpm
2114c4c61beb53cec128742b3eb962cd 2009.0/i586/mono-winforms-1.9.1-5.1mdv2009.0.i586.rpm
f7f47b023e448b4edebf943209a32f42 2009.0/SRPMS/mono-1.9.1-5.1mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64:
1b2ca9840e07c47758dcf3aa66ad4367 2009.0/x86_64/jay-1.9.1-5.1mdv2009.0.x86_64.rpm
16f5db14e7949dff516cfdaa2004f5d7 2009.0/x86_64/lib64mono0-1.9.1-5.1mdv2009.0.x86_64.rpm
e6ff401524139a6c4a3fe097bc274970 2009.0/x86_64/lib64mono-devel-1.9.1-5.1mdv2009.0.x86_64.rpm
157f138f5be18ecf545de96a1929e4b0 2009.0/x86_64/mono-1.9.1-5.1mdv2009.0.x86_64.rpm
1ab5a961ca38695a270dd6075a1583d1 2009.0/x86_64/mono-bytefx-data-mysql-1.9.1-5.1mdv2009.0.x86_64.rpm
c01fc743fdffa3732456a4475614f383 2009.0/x86_64/mono-data-1.9.1-5.1mdv2009.0.x86_64.rpm
e7d4830269f7faeb49613ebbb67f3dae 2009.0/x86_64/mono-data-firebird-1.9.1-5.1mdv2009.0.x86_64.rpm
b0d605fbaac97eddb4aa3bce5d1e1b57 2009.0/x86_64/mono-data-oracle-1.9.1-5.1mdv2009.0.x86_64.rpm
a8729be18c8c108b37a7083c13d8033a 2009.0/x86_64/mono-data-postgresql-1.9.1-5.1mdv2009.0.x86_64.rpm
8c194ba44afcbddcb90858b8855b3805 2009.0/x86_64/mono-data-sqlite-1.9.1-5.1mdv2009.0.x86_64.rpm
4eea17feb8b1893cb00bbcfe183cbb39 2009.0/x86_64/mono-data-sybase-1.9.1-5.1mdv2009.0.x86_64.rpm
9f277dc3d630ad9261a2c1a40a635e2b 2009.0/x86_64/mono-doc-1.9.1-5.1mdv2009.0.x86_64.rpm
bbb9c069ab919155ee1ec8eeb2671de1 2009.0/x86_64/mono-extras-1.9.1-5.1mdv2009.0.x86_64.rpm
46f1f4f03ae3c4252f42bf8f1b616e7a 2009.0/x86_64/mono-ibm-data-db2-1.9.1-5.1mdv2009.0.x86_64.rpm
9edd0f3f9754d5b732c1ce0737fa2899 2009.0/x86_64/mono-jscript-1.9.1-5.1mdv2009.0.x86_64.rpm
5abebe6e93d2f070a4f3551e82e9b0f4 2009.0/x86_64/mono-locale-extras-1.9.1-5.1mdv2009.0.x86_64.rpm
4a352a358ceff9d07d6558efe1efebaa 2009.0/x86_64/mono-nunit-1.9.1-5.1mdv2009.0.x86_64.rpm
610526970facf1ce4541c390ef6a2b3e 2009.0/x86_64/mono-web-1.9.1-5.1mdv2009.0.x86_64.rpm
75d98e18a5fc2b14877125ecd0375197 2009.0/x86_64/mono-winforms-1.9.1-5.1mdv2009.0.x86_64.rpm
f7f47b023e448b4edebf943209a32f42 2009.0/SRPMS/mono-1.9.1-5.1mdv2009.0.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFI8L0lmqjQ0CJFipgRApwyAJ4vLjYUZyjYUW0JoUk0A8zJfB4R3gCgulFi
fJ00hjtK0gKPiw9KBQdLIhs=
=M6oK
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close