Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.890836
Kategorie:Debian Local Security Checks
Titel:Debian LTS: Security Advisory for munin (DLA-836-2)
Zusammenfassung:The update for munin issued as DLA-836-1 caused a regression in the;zooming functionality in munin-cgi-graph. Updated packages are now;available to correct this issue. For reference, the original advisory;text follows.;;Stevie Trujillo discovered a command injection vulnerability in munin,;a network-wide graphing framework. The CGI script for drawing graphs;allowed to pass arbitrary GET parameters to local shell command,;allowing command execution as the user that runs the webserver.
Beschreibung:Summary:
The update for munin issued as DLA-836-1 caused a regression in the
zooming functionality in munin-cgi-graph. Updated packages are now
available to correct this issue. For reference, the original advisory
text follows.

Stevie Trujillo discovered a command injection vulnerability in munin,
a network-wide graphing framework. The CGI script for drawing graphs
allowed to pass arbitrary GET parameters to local shell command,
allowing command execution as the user that runs the webserver.

Affected Software/OS:
munin on Debian Linux

Solution:
For Debian 7 'Wheezy', these problems have been fixed in version
2.0.6-4+deb7u4.

We recommend that you upgrade your munin packages.

CVSS Score:
1.9

CVSS Vector:
AV:L/AC:M/Au:N/C:N/I:P/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2017-6188
BugTraq ID: 96399
http://www.securityfocus.com/bid/96399
Debian Security Information: DSA-3794 (Google Search)
https://www.debian.org/security/2017/dsa-3794
https://security.gentoo.org/glsa/201710-05
CopyrightCopyright (C) 2018 Greenbone Networks GmbH http://greenbone.net

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.