Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 14 Sep 2012 20:21:27 +0200
From: Agostino Sarubbo <ago@...too.org>
To: oss-security@...ts.openwall.com
Subject: CVE request: bacula: Console ACL Bypass

Hello,

>From secunia advisory https://secunia.com/advisories/50535/ :

The security issue is caused due to an error within the implementation of 
console ACLs, which can be exploited to gain access to certain restricted 
functionality and e.g. dump resources.
The security issue is reported in versions prior to 5.2.11.

Patch: http://sourceforge.net/projects/bacula/files/bacula/5.2.11/0001-Fix-
bug-1932-director-crash.patch

Can you assign a CVE for this issue?
-- 
Agostino Sarubbo / ago -at- gentoo.org
Gentoo/AMD64 Arch Security Liaison
GPG: 0x7CD2DC5D
Download attachment "signature.asc" of type "application/pgp-signature" (491 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.