On Tue, Oct 28, 2008 at 10:41:33AM +0100, Giuseppe Iuculano wrote:
> Package: ktorrent
> Version: 3.1.1+dfsg.1-1
> Severity: important
> Tags: security
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> 
> - From Secunia:
> 
> Some vulnerabilities have been discovered in KTorrent, which can be
> exploited by malicious users to compromise a vulnerable system and
> malicious people to bypass certain security restrictions.
> 
> 1) The web interface plugin does not properly restrict access to the
> torrent upload functionality. This can be exploited to upload
> arbitrary torrent files by sending specially crafted HTTP POST
> request to the affected application.
> 
> 2) The web interface plugin does not properly sanitise request
> parameters before passing them to the PHP interpreter. This can be
> exploited to inject and execute arbitrary PHP code by passing
> specially crafted parameters to the PHP scripts of the web
> interface.
> 
> Successful exploitation of the vulnerabilities requires that the web
> interface plugin is enabled (not the default setting).

What's the status of this for Lenny?

Cheers,
        Moritz



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to