Your message dated Mon, 21 Jan 2008 19:46:23 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Bug#461444: maxdb: CVE-2008-0244 insufficient input sanitizing
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: maxdb-7.5.00
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for maxdb-7.5.00.

CVE-2008-0244[0]:
| SAP MaxDB 7.6.03 build 007 and earlier allows remote attackers to
| execute arbitrary commands via "&amp;&amp;" and other shell metacharacters in
| exec_sdbinfo and other unspecified commands, which are executed when
| MaxDB invokes cons.exe.

Please check if this also works with the version we ship, I 
have no maxdb installation to test.

If you fix this vulnerability please also include the CVE id
in your changelog entry.

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0244

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpDsteGaMgI5.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
Hi,

the MaxDB packages have been removed from the Debian archive. Please see bug #461456 for details.

Sorry for having to use such drastic measures.

Best wishes,

Martin.


--- End Message ---

Reply via email to