|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2005-2149: cacti 0.8.6f released | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Marcus Meissner <meissner> |
| Component: | Incidents | Assignee: | Matthias Eckermann <mge> |
| Status: | RESOLVED DUPLICATE | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P5 - None | CC: | aj, security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | All | ||
| Whiteboard: | CVE-2005-2149: CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) | ||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Marcus Meissner
2005-07-07 11:41:07 UTC
Here are two more ids for the problems in cacti, in particular what
Stefan Esser discovered.
Regards,
Joey
======================================================
Candidate: CAN-2005-2148
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2148
Final-Decision:
Interim-Decision:
Modified:
Proposed:
Assigned: 20050706
Category: SF
Reference: MISC:http://www.hardened-php.net/advisory-032005.php
Reference: MISC:http://www.hardened-php.net/advisory-042005.php
Reference: MLIST:[cacti-announce] 20050701 Cacti 0.8.6f Released
Reference:
URL:http://sourceforge.net/mailarchive/forum.php?forum_id=10360&max_rows=25&style=flat&viewmonth=200507&viewday=1
Reference:
CONFIRM:http://www.cacti.net/downloads/patches/0.8.6e/cacti-0.8.6f_security.patch
Cacti 0.8.6e and earlier does not perform proper input validation to
protect against common attacks, which allows remote attackers to
execute arbitrary commands or SQL by sending a legitimate value in a
POST request or cookie, then specifying the attack string in the URL,
which causes the get_request_var function to return the wrong value in
the $_REQUEST variable, which is cleansed while the original malicious
$_GET value remains unmodified, as demonstrated in (1) graph_image.php
and (2) graph.php.
======================================================
Candidate: CAN-2005-2149
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2149
Final-Decision:
Interim-Decision:
Modified:
Proposed:
Assigned: 20050706
Category: SF
Reference: MISC:http://www.hardened-php.net/advisory-052005.php
Reference: MLIST:[cacti-announce] 20050701 Cacti 0.8.6f Released
Reference:
URL:http://sourceforge.net/mailarchive/forum.php?forum_id=10360&max_rows=25&style=flat&viewmonth=200507&viewday=1
Reference:
CONFIRM:http://www.cacti.net/downloads/patches/0.8.6e/cacti-0.8.6f_security.patch
config.php in Cacti 0.8.6e and earlier allows remote attackers to set
to modify session information to gain privileges and disable the use
of addslashes to protect against SQL injection by setting the
no_http_headers switch.
actually a dup. sorry *** This bug has been marked as a duplicate of 91166 *** CVE-2005-2149: CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) |