diff options
author | nectar <nectar@FreeBSD.org> | 2005-02-23 23:11:02 +0800 |
---|---|---|
committer | nectar <nectar@FreeBSD.org> | 2005-02-23 23:11:02 +0800 |
commit | 01bc2b6d998375cdf7c47590aa45de13be207669 (patch) | |
tree | af041f61ad552a90f5c53398f134838d2e4ce1ff /security | |
parent | b8a0a51843ebec6058011cdff5103608234205d9 (diff) | |
download | freebsd-ports-gnome-01bc2b6d998375cdf7c47590aa45de13be207669.tar.gz freebsd-ports-gnome-01bc2b6d998375cdf7c47590aa45de13be207669.tar.zst freebsd-ports-gnome-01bc2b6d998375cdf7c47590aa45de13be207669.zip |
De-confuse latest AWStats entry: rewrite description, and add relevant
references. There were so many bugs, it was hard to keep them straight
(^_^).
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 35 |
1 files changed, 22 insertions, 13 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index caf72d8b6e66..0c151727f287 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -353,7 +353,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. </vuln> <vuln vid="fdad8a87-7f94-11d9-a9e7-0001020eed82"> - <topic>awstats -- multiple vulnerabilities</topic> + <topic>awstats -- arbitrary command execution</topic> <affects> <package> <name>awstats</name> @@ -362,28 +362,36 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>A GHC advisory reports:</p> - <blockquote cite="http://marc.theaimsgroup.com/?l=bugtraq&m=110840530924124"> - <p>Successful exploitation of an input validation - vulnerability in AWStats scripts allows attackers to - execute limited perl directives under the privileges of - the web server, get sensetive information. Some actions - of the attacker can lead to denial of service.</p> - </blockquote> - <p>Some reports indicate that these vulnerabilities can be - used to execute arbitrary commands with the privileges of - the web server awstats is running under.</p> + <p>Several input validation errors exist in AWStats that allow a + remote unauthenticated attacker to execute arbitrary commands + with the priviliges of the web server. These programming + errors involve CGI parameters including + <code>loadplugin</code>, <code>logfile</code>, + <code>pluginmode</code>, <code>update</code>, and possibly + others.</p> + <p>Additionally, the <code>debug</code> and other CGI parameters + may be used to cause AWStats to disclose AWStats and system + configuration information.</p> </body> </description> <references> + <cvename>CAN-2005-0362</cvename> + <cvename>CAN-2005-0363</cvename> + <cvename>CAN-2005-0435</cvename> + <cvename>CAN-2005-0436</cvename> + <cvename>CAN-2005-0437</cvename> + <cvename>CAN-2005-0438</cvename> <bid>12543</bid> <bid>12545</bid> <mlist msgid="20050214081040.3370.qmail@www.securityfocus.com">http://marc.theaimsgroup.com/?l=bugtraq&m=110840530924124</mlist> <url>http://awstats.sourceforge.net/docs/awstats_changelog.txt</url> + <url>http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488</url> + <url>http://packetstormsecurity.nl/0501-exploits/AWStatsVulnAnalysis.pdf</url> </references> <dates> <discovery>2005-02-10</discovery> <entry>2005-02-16</entry> + <modified>2005-02-23</modified> </dates> </vuln> @@ -2023,11 +2031,12 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. <certvu>272296</certvu> <mlist msgid="FB24803D1DF2A34FA59FC157B77C970503C8B20C@idserv04.idef.com">http://marc.theaimsgroup.com/?l=full-disclosure&m=110600949323439</mlist> <url>http://awstats.sourceforge.net/docs/awstats_changelog.txt</url> + <url>http://www.idefense.com/application/poi/display?id=185&type=vulnerabilities&flashstatus=false</url> </references> <dates> <discovery>2004-10-21</discovery> <entry>2005-01-18</entry> - <modified>2005-02-15</modified> + <modified>2005-02-23</modified> </dates> </vuln> |