Package: dcl Version: 1:0.9.2-2 Severity: grave Tags: security CAN-2005-0887 describes this security hole:
Code injection vulnerability in Double Choco Latte before 0.9.4.3 allows remote attackers to execute arbitrary PHP code via the menuAction variable in (1) functions.inc.php or (2) main.php, which causes code to be injected into an eval statement. http://securitytracker.com/alerts/2005/Mar/1013559.html has some details; note that we have an older version of the program so will not be affected by the XSS vulnerability that was intorduced in version 0.9.4.3. Both holes are fixed in 0.9.4.4. There's little detail about the problem and I've not checked in depth, but some cursory diffing to see what was changed between 0.9.4.2 and .3 suggests that dcl was vulnerable to this hole as far back as the version in unstable. I notice that this package is orphaned. If nobody steps up to take over maintenance, it will likely e removed from debian. -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.4.27 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Versions of packages dcl depends on: ii apache2-mpm-prefork [httpd] 2.0.53-5 traditional model for Apache2 ii bash 3.0-14 The GNU Bourne Again SHell ii debconf 1.4.46 Debian configuration management sy ii grep 2.5.1.ds1-4 GNU grep, egrep and fgrep pn php4 | php3 Not found. ii python 2.3.5-1 An interactive high-level object-o ii sed 4.1.4-2 The GNU sed stream editor pn wwwconfig-common Not found. -- see shy jo
signature.asc
Description: Digital signature