Your message dated Sat, 07 Oct 2006 19:35:36 +0200
with message-id <[EMAIL PROTECTED]>
and subject line Fixed by upload of 7.5.00.34-5
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: maxdb-webtools
Severity: critical
Tags: security
A vulnerability has been found in MaxDB (CVE-2006-4305):
Buffer overflow in SAP DB and MaxDB before 7.6.00.30 allows remote
attackers to execute arbitrary code via a long database name when
connecting via a WebDBM client.
See e.g.
http://secunia.com/advisories/21677
for details
Severity critical because I assume it starts WebDBM by default ("introduces a
security hole on systems where you install the package"). If this is not the
case, it is only "grave".
--- End Message ---
--- Begin Message ---
The bug has been fixed in 7.5.00.34-5. Due to a typo in the changelog
the bug was not closed automatically.
--- End Message ---