Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 1 Apr 2010 15:31:18 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE Request -- Zabbix v1.8.2 and v.1.6.9

----- "Jan Lieskovsky" <jlieskov@...hat.com> wrote:

> Hi Steve, vendors,
> 
>    though April the First today, this doesn't seem to be a joke:
> 
>    a, Zabbix <= 1.8.1 SQL Injection
> 
>    [1] http://seclists.org/fulldisclosure/2010/Apr/1
>    [2] http://www.zabbix.com/rn1.8.2.php

Use CVE-2010-1144 for this one

> 
>    b, also on 25 March 2010, Zabbix v1.6.9 was
>       released:
> 
>    [3] http://www.zabbix.com/rn1.6.9.php
> 
>       fixing one security issue -- remote commands execution in Zabbix
> Server.
> 
>    [4] https://support.zabbix.com/browse/ZBX-1030
> 

Use CVE-2010-1145 for this one

Thanks

-- 
    JB

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.