Processing commands for [EMAIL PROTECTED]:
> severity 370576 minor
Bug#370576: acidbase: Remote File Inclusion Vulnerabilities
Severity set to `minor' from `grave'
> thanks
Stopping processing here.
Please contact me if you need assistance.
Debian bug tracking syst
On Jun 7, 2006, at 5:08 AM, David Gil wrote:
severity 370576 minor
thanks
Thanks...
El mar, 06-06-2006 a las 13:01 -0400, Kevin Johnson escribió:
I have to disagree with the Severity of grave. To exploit you need
to have register_globals set to on which has not been the default in
years.
severity 370576 minor
thanks
El mar, 06-06-2006 a las 13:01 -0400, Kevin Johnson escribió:
> I have to disagree with the Severity of grave. To exploit you need
> to have register_globals set to on which has not been the default in
> years.
Ok, now the bug has a minor severity. You are right
I have to disagree with the Severity of grave. To exploit you need
to have register_globals set to on which has not been the default in
years. We have released 1.2.5 which fixes the issue and a number of
other things. It just gets under my skin when "researchers" find
problems, elevate h
tags 370576 + fixed-upstream pending
thanks
Fixed in upstream BASE 1.2.5 (sarah). Expect a new package in a few
days.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Package: acidbase
Severity: grave
Tags: security
Justification: user security hole
http://www.frsirt.com/english/advisories/2006/1996
Advisory ID : FrSIRT/ADV-2006-1996
CVE ID : GENERIC-MAP-NOMATCH
Rated as : High Risk
Remotely Exploitable : Yes
Locally Exploitable : Yes
Release Date : 20
6 matches
Mail list logo