Your message dated Sat, 02 Apr 2005 03:32:19 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#301729: fixed in dcl 1:0.9.4.4-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 27 Mar 2005 23:41:18 +0000
>From [EMAIL PROTECTED] Sun Mar 27 15:41:18 2005
Return-path: <[EMAIL PROTECTED]>
Received: from kitenet.net [64.62.161.42] (postfix)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DFhNe-0000cK-00; Sun, 27 Mar 2005 15:41:18 -0800
Received: from dragon.kitenet.net (dial-190.r06.scabvl.infoave.net 
[207.144.140.190])
        (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
        (Client CN "Joey Hess", Issuer "Joey Hess" (verified OK))
        by kitenet.net (Postfix) with ESMTP id BF7F0181AE
        for <[EMAIL PROTECTED]>; Sun, 27 Mar 2005 23:41:15 +0000 (GMT)
Received: by dragon.kitenet.net (Postfix, from userid 1000)
        id DEBDB6E100; Sun, 27 Mar 2005 18:44:18 -0500 (EST)
Date: Sun, 27 Mar 2005 18:44:18 -0500
From: Joey Hess <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: code injection security hole
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
        protocol="application/pgp-signature"; boundary="Q68bSM7Ycu6FN28Q"
Content-Disposition: inline
X-Reportbug-Version: 3.8
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 


--Q68bSM7Ycu6FN28Q
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Package: dcl
Version: 1:0.9.2-2
Severity: grave
Tags: security

CAN-2005-0887 describes this security hole:

Code injection vulnerability in Double Choco Latte before 0.9.4.3 allows re=
mote
attackers to execute arbitrary PHP code via the menuAction variable in (1)
functions.inc.php or (2) main.php, which causes code to be injected into an
eval statement.

http://securitytracker.com/alerts/2005/Mar/1013559.html has some details;
note that we have an older version of the program so will not be affected
by the XSS vulnerability that was intorduced in version 0.9.4.3. Both holes
are fixed in 0.9.4.4.

There's little detail about the problem and I've not checked in depth, but
some cursory diffing to see what was changed between 0.9.4.2 and .3 suggests
that dcl was vulnerable to this hole as far back as the version in unstable.

I notice that this package is orphaned. If nobody steps up to take over
maintenance, it will likely e removed from debian.

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.4.27
Locale: LANG=3Den_US.UTF-8, LC_CTYPE=3Den_US.UTF-8 (charmap=3DUTF-8)

Versions of packages dcl depends on:
ii  apache2-mpm-prefork [httpd]  2.0.53-5    traditional model for Apache2
ii  bash                         3.0-14      The GNU Bourne Again SHell
ii  debconf                      1.4.46      Debian configuration managemen=
t sy
ii  grep                         2.5.1.ds1-4 GNU grep, egrep and fgrep
pn  php4 | php3                              Not found.
ii  python                       2.3.5-1     An interactive high-level obje=
ct-o
ii  sed                          4.1.4-2     The GNU sed stream editor
pn  wwwconfig-common                         Not found.

--=20
see shy jo

--Q68bSM7Ycu6FN28Q
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCR0VSd8HHehbQuO8RAkviAJ42PdqXJF4Iu/HHY/K4lpxC00BHMACdEham
riYHBgXq0Ki2Fr0HYOKyX8M=
=KsBF
-----END PGP SIGNATURE-----

--Q68bSM7Ycu6FN28Q--

---------------------------------------
Received: (at 301729-close) by bugs.debian.org; 2 Apr 2005 08:39:18 +0000
>From [EMAIL PROTECTED] Sat Apr 02 00:39:18 2005
Return-path: <[EMAIL PROTECTED]>
Received: from gluck.debian.org [192.25.206.10] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DHeA2-0000gA-00; Sat, 02 Apr 2005 00:39:18 -0800
Received: from newraff.debian.org [208.185.25.31] (mail)
        by gluck.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DHeA0-0007BM-00; Sat, 02 Apr 2005 01:39:16 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1DHe3H-0004cF-00; Sat, 02 Apr 2005 03:32:19 -0500
From: Anibal Monsalve Salazar <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#301729: fixed in dcl 1:0.9.4.4-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Sat, 02 Apr 2005 03:32:19 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 2

Source: dcl
Source-Version: 1:0.9.4.4-1

We believe that the bug you reported is fixed in the latest version of
dcl, which is due to be installed in the Debian FTP archive:

dcl_0.9.4.4-1.diff.gz
  to pool/main/d/dcl/dcl_0.9.4.4-1.diff.gz
dcl_0.9.4.4-1.dsc
  to pool/main/d/dcl/dcl_0.9.4.4-1.dsc
dcl_0.9.4.4-1_all.deb
  to pool/main/d/dcl/dcl_0.9.4.4-1_all.deb
dcl_0.9.4.4.orig.tar.gz
  to pool/main/d/dcl/dcl_0.9.4.4.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Anibal Monsalve Salazar <[EMAIL PROTECTED]> (supplier of updated dcl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sat, 02 Apr 2005 12:16:07 +1000
Source: dcl
Binary: dcl
Architecture: source all
Version: 1:0.9.4.4-1
Distribution: unstable
Urgency: high
Maintainer: Debian QA Group <[EMAIL PROTECTED]>
Changed-By: Anibal Monsalve Salazar <[EMAIL PROTECTED]>
Description: 
 dcl        - GNU Enterprise - Double Choco Latte
Closes: 197628 224526 301729
Changes: 
 dcl (1:0.9.4.4-1) unstable; urgency=high
 .
   * QA Upload.
   * Set Maintainer to Debian QA Group.
   * New upstream release.
   * Fixed "code injection security hole", closes: #301729.
   * Fixed "0.9.4.2 is available", closes: #197628.
   * Fixed "missing files: /etc/dcl/apache.conf, INSTALL.txt", closes: #224526.
     Patch by Jérôme Warnier <[EMAIL PROTECTED]>.
Files: 
 4dd1be8cdd16c2483a6f3914079acd49 572 web optional dcl_0.9.4.4-1.dsc
 71c1ef6af96411f7640e5042d87ff0aa 998611 web optional dcl_0.9.4.4.orig.tar.gz
 309e9793db4d16fe44adfa700704a400 4387 web optional dcl_0.9.4.4-1.diff.gz
 ae863843424e6efd88d67c67e801ea4d 922652 web optional dcl_0.9.4.4-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFCTlRHgY5NIXPNpFURAhpjAJ9ftbO0WDqdk6GclLuNPUO2biNhBgCfS+ix
5CRe3HDg4PM7RIGLf0UZ7cM=
=5Z24
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to