Package: viewvc
Severity: normal
Tags: patch, security

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for viewvc.

CVE-2008-4325[0]:
| lib/viewvc.py in ViewVC 1.0.5 uses the content-type parameter in the
| HTTP request for the Content-Type header in the HTTP response, which
| allows remote attackers to cause content to be misinterpreted by the
| browser via a content-type parameter that is inconsistent with the
| requested object.  NOTE: this issue might not be a vulnerability, since
| it requires attacker access to the repository that is being viewed.

The upstream bugreport[1] contains an explanation and also a patch[2].

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

I don't think it is really exploitable or a serious issue, but nonetheless,
I thought you'd like to know.

Cheers
Steffen

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4325
    http://security-tracker.debian.net/tracker/CVE-2008-4325
[1] http://viewvc.tigris.org/issues/show_bug.cgi?id=354
[2] 
http://viewvc.tigris.org/source/browse/viewvc/trunk/lib/viewvc.py?rev=2011&r1=1968&r2=1978



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to