-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ Debian Security Advisory DSA-1519-1 security@debian.org http://www.debian.org/security/ Thijs Kinkhorst March 15, 2008 http://www.debian.org/security/faq - ------------------------------------------------------------------------ Package : horde3 Vulnerability : insufficient input sanitising Problem type : remote Debian-specific: no CVE Id(s) : CVE-2008-1284 Debian Bug : 470640 It was discovered that the Horde web application framework permits arbitrary file inclusion by a remote attacker through the theme preference parameter. The old stable distribution (sarge) this problem has been fixed in version 3.0.4-4sarge7. For the stable distribution (etch) this problem has been fixed in version 3.1.3-4etch3. For the unstable distribution (sid) this problem has been fixed in version 3.1.7-1. We recommend that you upgrade your horde3 package. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/h/horde3/horde3_3.0.4-4sarge7.dsc Size/MD5 checksum: 920 b3374347290398c40e95d94ca72f089c http://security.debian.org/pool/updates/main/h/horde3/horde3_3.0.4.orig.tar.gz Size/MD5 checksum: 3378143 e2221d409ba1c8841ce4ecee981d7b61 http://security.debian.org/pool/updates/main/h/horde3/horde3_3.0.4-4sarge7.diff.gz Size/MD5 checksum: 14280 01c1df81c247bf310367f50859ebb2ff Architecture independent packages: http://security.debian.org/pool/updates/main/h/horde3/horde3_3.0.4-4sarge7_all.deb Size/MD5 checksum: 3437956 4c4fa0aa9f5347785ca74f414165f934 Debian GNU/Linux 4.0 alias etch - ------------------------------- Source archives: http://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3-4etch3.diff.gz Size/MD5 checksum: 13100 d79fbe74794a4f6c70f208ba3a55bebc http://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3-4etch3.dsc Size/MD5 checksum: 974 f8929682acb675550e4235c62a99cbe6 http://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3.orig.tar.gz Size/MD5 checksum: 5232958 fbc56c608ac81474b846b1b4b7bb5ee7 Architecture independent packages: http://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3-4etch3_all.deb Size/MD5 checksum: 5270328 d4a9a4db3744a2cd496ed499c39ec6b3 These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show ' and http://packages.debian.org/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iQEVAwUBR9xcEWz0hbPcukPfAQJ1Fwf7BNqYgPzAk4NwoZEcuum64NWdrXb7gzCc qfs+NIuGVbDBeSB7aQkvxeYvwKg7MJpAYo06/vDM+5NbHgDylfUw1AyyD96b9PrJ hFOtF2cHt3kpmq1zjnC8rqW9ULyk3fPDTRtbZizBoFZcpk5mjJQ23BsG9BFAT+Gs ORdNIw1qFnjfvLwtAJmUAe/aOGuN8DSd+S2+FdR6RmvHDsWulBoQMaqi3eI7M7I5 76CVv72rK0a2LikZUJpV/XG/3weZzixIYVTn6gDpj6pRmsPCD9vgEt/EBaBPN2Yp 59synQ1Iu8YfUsHlePpf9Xv0/ddNDkHZtuoRdqJuz+kPvkV2N8DQ5Q== =sl4d -----END PGP SIGNATURE-----