Your message dated Sun, 24 Jul 2005 17:22:34 -0400
with message-id <[EMAIL PROTECTED]>
and subject line security fixes available in all releases now
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 25 Jun 2005 05:00:32 +0000
>From [EMAIL PROTECTED] Fri Jun 24 22:00:32 2005
Return-path: <[EMAIL PROTECTED]>
Received: from dsl092-235-113.phl1.dsl.speakeasy.net (sativa.seanius.net) 
[66.92.235.113] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1Dm2mO-00066n-00; Fri, 24 Jun 2005 22:00:32 -0700
Received: by sativa.seanius.net (Postfix, from userid 1000)
        id 8316715844; Sat, 25 Jun 2005 00:59:58 -0400 (EDT)
Date: Sat, 25 Jun 2005 00:59:58 -0400
From: seanius <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: cacti: vulnerable to remote exploit
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.5.5.1+cvs20040105i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: cacti
Version: 0.8.6d-1
Severity: critical
Tags: sarge
Justification: root security hole

Multiple Vendor Cacti Remote File Inclusion Vulnerability:
 http://www.idefense.com/application/poi/display?id=265&type=vulnerabilities

Multiple Vendor Cacti config_settings.php Remote Code Execution Vulnerability:
 http://www.idefense.com/application/poi/display?id=266&type=vulnerabilities

Multiple Vendor Cacti Multiple SQL Injection Vulnerabilities:
 http://www.idefense.com/application/poi/display?id=267&type=vulnerabilities

note that these can not by themselves gain root access on a system,
though they have been reported to be used to leverage root on sarge
systems.

an update has been sitting on my p.d.o site since last friday, but
there has not yet been a security upload.  i'll send the latest i mailed
to folks as an update to this bug.


        sean

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.10-9-amd64-k8
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages cacti depends on:
ii  apache                       1.3.33-6    versatile, high-performance HTTP s
ii  apache-ssl                   1.3.33-6    versatile, high-performance HTTP s
ii  debconf                      1.4.50      Debian configuration management sy
ii  libphp-adodb                 4.52-1      The 'adodb' database abstraction l
ii  logrotate                    3.7-5       Log rotation utility
ii  mysql-client-4.1 [mysql-clie 4.1.11a-4   mysql database client binaries
ii  php4                         4:4.3.10-15 server-side, HTML-embedded scripti
ii  php4-cli                     4:4.3.10-15 command-line interpreter for the p
ii  php4-mysql                   4:4.3.10-15 MySQL module for php4
ii  php4-snmp                    4:4.3.10-15 SNMP module for php4
ii  rrdtool                      1.0.49-1    Time-series data storage and displ
ii  snmp                         5.1.2-6.1   NET SNMP (Simple Network Managemen
ii  ucf                          1.18        Update Configuration File: preserv

-- debconf information excluded


---------------------------------------
Received: (at 315703-close) by bugs.debian.org; 24 Jul 2005 21:23:12 +0000
>From [EMAIL PROTECTED] Sun Jul 24 14:23:12 2005
Return-path: <[EMAIL PROTECTED]>
Received: from dsl092-235-113.phl1.dsl.speakeasy.net (sativa.seanius.net) 
[66.92.235.113] 
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1DwnwG-0006fT-00; Sun, 24 Jul 2005 14:23:12 -0700
Received: by sativa.seanius.net (Postfix, from userid 1000)
        id 22E3115834; Sun, 24 Jul 2005 17:22:34 -0400 (EDT)
Date: Sun, 24 Jul 2005 17:22:34 -0400
From: sean finney <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: security fixes available in all releases now
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
        protocol="application/pgp-signature"; boundary="Q68bSM7Ycu6FN28Q"
Content-Disposition: inline
User-Agent: Mutt/1.5.5.1+cvs20040105i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no 
        version=2.60-bugs.debian.org_2005_01_02


--Q68bSM7Ycu6FN28Q
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

so i'm closing these bugs.

--=20

--Q68bSM7Ycu6FN28Q
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFC5AaaynjLPm522B0RAtcrAJ45mQXwszwTUaOaqsj3L1QuzVloQQCcDgfL
NYjMqgsro0VCt0bzhdTWOYs=
=shoN
-----END PGP SIGNATURE-----

--Q68bSM7Ycu6FN28Q--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to