|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: potential vulnerability in ampache due to bug in PHP Snoopy module | ||
|---|---|---|---|
| Product: | [openSUSE] SUSE LINUX 10.0 | Reporter: | Peter Poeml <poeml> |
| Component: | Security | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | E-mail List <qa-bugs> |
| Severity: | Normal | ||
| Priority: | P5 - None | ||
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Other | ||
| Whiteboard: | CVE-2005-3330: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) | ||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Attachments: |
diff between Snoopy 1.2 and 1.2.1
patch for ampache-3.3.1.2 |
||
|
Description
Peter Poeml
2005-12-02 16:16:15 UTC
Created attachment 59711 [details]
diff between Snoopy 1.2 and 1.2.1
Created attachment 59712 [details]
patch for ampache-3.3.1.2
CVE-2005-3330 "The _httpsrequest function in Snoopy 1.2, as used in products such as (1) MagpieRSS, (2) WordPress, and (3) Ampache, allows remote attackers to execute arbitrary commands via shell metacharacters in an HTTPS URL to an SSL protected web page, which is not properly handled by the fetch function." I would say go ahead with fixing the package. the bug affects only 10.0 fixed package submitted for 10.0 I'll fix STABLE now as well since it is a public bug. Reassigning to you guys for further tracking. swampid: 3204 update approved. CVE-2005-3330: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) |