Package: dcl
Version: 1:0.9.2-2
Severity: grave
Tags: security

CAN-2005-0887 describes this security hole:

Code injection vulnerability in Double Choco Latte before 0.9.4.3 allows remote
attackers to execute arbitrary PHP code via the menuAction variable in (1)
functions.inc.php or (2) main.php, which causes code to be injected into an
eval statement.

http://securitytracker.com/alerts/2005/Mar/1013559.html has some details;
note that we have an older version of the program so will not be affected
by the XSS vulnerability that was intorduced in version 0.9.4.3. Both holes
are fixed in 0.9.4.4.

There's little detail about the problem and I've not checked in depth, but
some cursory diffing to see what was changed between 0.9.4.2 and .3 suggests
that dcl was vulnerable to this hole as far back as the version in unstable.

I notice that this package is orphaned. If nobody steps up to take over
maintenance, it will likely e removed from debian.

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.4.27
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages dcl depends on:
ii  apache2-mpm-prefork [httpd]  2.0.53-5    traditional model for Apache2
ii  bash                         3.0-14      The GNU Bourne Again SHell
ii  debconf                      1.4.46      Debian configuration management sy
ii  grep                         2.5.1.ds1-4 GNU grep, egrep and fgrep
pn  php4 | php3                              Not found.
ii  python                       2.3.5-1     An interactive high-level object-o
ii  sed                          4.1.4-2     The GNU sed stream editor
pn  wwwconfig-common                         Not found.

-- 
see shy jo

Attachment: signature.asc
Description: Digital signature

Reply via email to