Your message dated Fri, 16 Dec 2005 21:19:49 -0800 with message-id <[EMAIL PROTECTED]> and subject line Bug#322591: fixed in awstats 6.4-1sarge1 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 11 Aug 2005 16:45:52 +0000 >From [EMAIL PROTECTED] Thu Aug 11 09:45:51 2005 Return-path: <[EMAIL PROTECTED]> Received: from mail01.pironet-ndh.com (mail.pironet-ndh.com) [194.64.31.10] by spohr.debian.org with esmtp (Exim 3.36 1 (Debian)) id 1E3GBj-00038Y-00; Thu, 11 Aug 2005 09:45:51 -0700 Received: from mail.fbn-dd.de (mail.fbn-dd.de [195.227.105.178]) by mail.pironet-ndh.com (Postfix) with ESMTP id A5E5B55E3D2; Thu, 11 Aug 2005 18:45:19 +0200 (CEST) Received: from sonne.intranet.fbn-dd.de (192-168-0-1.transfer-000.intranet.fbn-dd.de [192.168.0.1]) by mail.fbn-dd.de (Postfix) with ESMTP id 101A734ED5; Thu, 11 Aug 2005 18:44:57 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by sonne.intranet.fbn-dd.de (Postfix) with ESMTP id 3D843203D9; Thu, 11 Aug 2005 18:44:56 +0200 (CEST) Received: from sonne.intranet.fbn-dd.de (localhost [127.0.0.1]) by localhost (AvMailGate-2.0.1.16) id 18002-2E0CA844; Thu, 11 Aug 2005 18:44:56 +0200 Received: from localhost.localdomain (10-28-130-200.intranet-28-130.fbn-dd.de [10.28.130.200]) by sonne.intranet.fbn-dd.de (Postfix) with ESMTP id 1290D203D9; Thu, 11 Aug 2005 18:44:56 +0200 (CEST) Received: by localhost.localdomain (Postfix, from userid 1000) id 0DF885B3A; Thu, 11 Aug 2005 18:44:56 +0200 (CEST) Date: Thu, 11 Aug 2005 18:44:56 +0200 From: Martin Pitt <[EMAIL PROTECTED]> To: Debian BTS Submit <[EMAIL PROTECTED]> Cc: [EMAIL PROTECTED] Subject: awstats: [CAN-2005-1527] arbitrary command injection Message-ID: <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="2fHTh5uZTiUOsy+g" Content-Disposition: inline User-Agent: Mutt/1.5.9i X-AntiVirus: checked by AntiVir MailGate (version: 2.0.1.16; AVE: 6.31.1.0; VDF: 6.31.1.97; host: sonne) Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 --2fHTh5uZTiUOsy+g Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Package: awstats Version: 6.4-1 Severity: grave Tags: patch security Hi! awstats is vulnerable to a command injection flaw in crafted referer URLs. Details are at: http://www.idefense.com/application/poi/display?id=3D290&type=3Dvulnerabi= lities This is CAN-2005-1527, please mention it in the changelog. You can get the Ubuntu patch from http://patches.ubuntu.com/patches/awstats.CAN-2005-1527.diff The patch is not really minimal since it replaces _all_ eval calls with their equivalent, but faster and safer counterparts (soft references), though. So if you prefer a minimal patch, this would be it: --- awstats-6.4/wwwroot/cgi-bin/awstats.pl 2005-08-11 18:20:39.000000000 +0= 200 +++ awstats-6.4.new/wwwroot/cgi-bin/awstats.pl 2005-08-11 18:21:14.00000000= 0 +0200 @@ -4838,8 +4856,10 @@ =20 # Call to plugins' function ShowInfoURL foreach my $pluginname (keys %{$PluginsLoaded{'ShowInfoURL'}}) { - my $function=3D"ShowInfoURL_$pluginname('$url')"; - eval("$function"); +# my $function=3D"ShowInfoURL_$pluginname('$url')"; +# eval("$function"); + my $function=3D"ShowInfoURL_$pluginname"; + &$function($url); } --=20 Martin Pitt http://www.piware.de Ubuntu Developer http://www.ubuntu.com Debian Developer http://www.debian.org --2fHTh5uZTiUOsy+g Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFC+4CIDecnbV4Fd/IRAg6SAKC1S5/PeccB5Ohtz9ibzZOQBvk4AwCfT1RQ RUnNSEemMovd6/zBRAx2M+U= =CAyZ -----END PGP SIGNATURE----- --2fHTh5uZTiUOsy+g-- --------------------------------------- Received: (at 322591-close) by bugs.debian.org; 17 Dec 2005 05:21:16 +0000 >From [EMAIL PROTECTED] Fri Dec 16 21:21:16 2005 Return-path: <[EMAIL PROTECTED]> Received: from katie by spohr.debian.org with local (Exim 4.50) id 1EnUU1-0007nm-TI; Fri, 16 Dec 2005 21:19:49 -0800 From: Jonas Smedegaard <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.17 $ Subject: Bug#322591: fixed in awstats 6.4-1sarge1 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Fri, 16 Dec 2005 21:19:49 -0800 X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 Source: awstats Source-Version: 6.4-1sarge1 We believe that the bug you reported is fixed in the latest version of awstats, which is due to be installed in the Debian FTP archive: awstats_6.4-1sarge1.diff.gz to pool/main/a/awstats/awstats_6.4-1sarge1.diff.gz awstats_6.4-1sarge1.dsc to pool/main/a/awstats/awstats_6.4-1sarge1.dsc awstats_6.4-1sarge1_all.deb to pool/main/a/awstats/awstats_6.4-1sarge1_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Jonas Smedegaard <[EMAIL PROTECTED]> (supplier of updated awstats package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Wed, 9 Nov 2005 17:23:56 +0100 Source: awstats Binary: awstats Architecture: source all Version: 6.4-1sarge1 Distribution: stable-security Urgency: high Maintainer: Jonas Smedegaard <[EMAIL PROTECTED]> Changed-By: Jonas Smedegaard <[EMAIL PROTECTED]> Description: awstats - powerful and featureful web server log analyzer Closes: 322591 Changes: awstats (6.4-1sarge1) stable-security; urgency=high . [ Charles Fry ] * SECURITY UPDATE: Fix arbitrary command injection. (Closes: #322591) Thanks to Martin Pitt for reporting the issue and providing the patch. * Add debian/patches/03_remove_eval.patch: - Replace all eval() calls for dynamically constructed function names with soft references. This fixes arbitrary command injection with specially crafted referer URLs which contain Perl code. - Patch taken from upstream CVS, and contained in 6.5 release. * References: CAN-2005-1527 http://www.idefense.com/application/poi/display?id=290&type=vulnerabilities . [ Jonas Smedegaard ] * Adjust distribution. Files: 82449cbf170952a0e5d31648c7943656 589 web optional awstats_6.4-1sarge1.dsc 056e6fb0c7351b17fe5bbbe0aa1297b1 918435 web optional awstats_6.4.orig.tar.gz c4efeefcab00fdda3c53e74e32cc0aab 18257 web optional awstats_6.4-1sarge1.diff.gz ed12fcb3a2a00b4f440dc9091a2ca78d 728430 web optional awstats_6.4-1sarge1_all.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) iD8DBQFDciqvn7DbMsAkQLgRAs+QAJ0bbvOWdtFJoAU7MH16VzgUBjhQ/QCfYUMv Yj8+aH2NkNCiaXD3wLiT5H0= =R9YJ -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]