Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 14 Sep 2012 20:21:27 +0200
From: Agostino Sarubbo <ago@...too.org>
To: oss-security@...ts.openwall.com
Subject: CVE request: bacula: Console ACL Bypass

Hello,

>From secunia advisory https://secunia.com/advisories/50535/ :

The security issue is caused due to an error within the implementation of 
console ACLs, which can be exploited to gain access to certain restricted 
functionality and e.g. dump resources.
The security issue is reported in versions prior to 5.2.11.

Patch: http://sourceforge.net/projects/bacula/files/bacula/5.2.11/0001-Fix-
bug-1932-director-crash.patch

Can you assign a CVE for this issue?
-- 
Agostino Sarubbo / ago -at- gentoo.org
Gentoo/AMD64 Arch Security Liaison
GPG: 0x7CD2DC5D
[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ