You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
gentoo-overlay/metadata/glsa/glsa-200604-07.xml

73 lines
2.7 KiB

<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200604-07">
<title>Cacti: Multiple vulnerabilities in included ADOdb</title>
<synopsis>
Multiple vulnerabilities have been discovered in the ADOdb layer included
in Cacti, potentially resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">Cacti</product>
<announced>2006-04-14</announced>
<revised count="01">2006-04-14</revised>
<bug>129284</bug>
<access>remote</access>
<affected>
<package name="net-analyzer/cacti" auto="yes" arch="*">
<unaffected range="ge">0.8.6h_p20060108-r2</unaffected>
<vulnerable range="lt">0.8.6h_p20060108-r2</vulnerable>
</package>
</affected>
<background>
<p>
Cacti is a complete web-based frontend to rrdtool. ADOdb is a
PHP-based database abstraction layer which is included in Cacti.
</p>
</background>
<description>
<p>
Several vulnerabilities have been identified in the copy of ADOdb
included in Cacti. Andreas Sandblad discovered a dynamic code
evaluation vulnerability (CVE-2006-0147) and a potential SQL injection
vulnerability (CVE-2006-0146). Andy Staudacher reported another SQL
injection vulnerability (CVE-2006-0410), and Gulftech Security
discovered multiple cross-site-scripting issues (CVE-2006-0806).
</p>
</description>
<impact type="high">
<p>
Remote attackers could trigger these vulnerabilities by sending
malicious queries to the Cacti web application, resulting in arbitrary
code execution, database compromise through arbitrary SQL execution,
and malicious HTML or JavaScript code injection.
</p>
</impact>
<workaround>
<p>
There is no known workaround at this time.
</p>
</workaround>
<resolution>
<p>
All Cacti users should upgrade to the latest version:
</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=net-analyzer/cacti-0.8.6h_p20060108-r2"</code>
</resolution>
<references>
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0146">CVE-2006-0146</uri>
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0147">CVE-2006-0147</uri>
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0410">CVE-2006-0410</uri>
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0806">CVE-2006-0806</uri>
</references>
<metadata tag="requester" timestamp="2006-04-13T06:13:49Z">
jaervosz
</metadata>
<metadata tag="submitter" timestamp="2006-04-13T16:58:52Z">
koon
</metadata>
<metadata tag="bugReady" timestamp="2006-04-13T20:36:27Z">
koon
</metadata>
</glsa>