Date: Mon, 24 May 2010 12:18:51 +0200 From: Jan Lieskovsky <jlieskov@...hat.com> To: "Steven M. Christey" <coley@...us.mitre.org> CC: oss-security <oss-security@...ts.openwall.com>, Nahuel Grisolia <nahuel@...sai-sec.com>, Stefan Esser <stefan.esser@...tioneins.de> Subject: CVE Request -- Cacti v0.8.7 -- three security fixes Hi Steve, Cacti upstream has released:  http://www.cacti.net/release_notes_0_8_7f.php latest v0.8.7 version, adressing three security flaws: [A], MOPS-2010-023: Cacti Graph Viewer SQL Injection Vulnerability  http://php-security.org/2010/05/13/mops-2010-023-cacti-graph-viewer-sql-injection-vulnerability/index.html  http://www.vupen.com/english/advisories/2010/1204 Credit: The vulnerability was discovered by Stefan Esser as part of the SQL Injection Marathon. Upstream changeset:  http://svn.cacti.net/viewvc?view=rev&revision=5920 [B], Cross-site scripting issues reported by VUPEN Security (http://www.vupen.com)  http://www.vupen.com/english/advisories/2010/1203 Credit: Vulnerabilities reported by Mohammed Boumediane (VUPEN Security). Upstream changeset:  http://svn.cacti.net/viewvc?view=rev&revision=5901 [C], SQL injection and shell escaping issues reported by Bonsai Information Security (http://www.bonsai-sec.com)  http://www.bonsai-sec.com/blog/index.php/using-grep-to-find-0days/  http://www.bonsai-sec.com/en/research/vulnerabilities/cacti-os-command-injection-0105.php Credit: This vulnerability was discovered by Nahuel Grisolia ( nahuel -at- bonsai-sec.com ) Upstream changeset:  http://svn.cacti.net/viewvc?view=rev&revision=5747 If a logged Cacti user was tricked into visiting a specially-crafted Web page, it could lead to: i, unauthorized arbitrary database data dislosure (vulnerability [A], from ), ii, unauthorized arbitrary scripting code execution (vulnerability [B], from ), iii, execution of unintended commands or accessing unauthorized data. (vulnerability [C], from ). References:  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582691  https://bugzilla.redhat.com/show_bug.cgi?id=595289 Could you allocate relevant CVE ids? Thanks && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.