---------------------------------------------------------------------- Want a new IT Security job? Vacant positions at Secunia: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Debian info2www Cross-Site Scripting Vulnerability SECUNIA ADVISORY ID: SA14997 VERIFY ADVISORY: http://secunia.com/advisories/14997/ CRITICAL: Less critical IMPACT: Cross Site Scripting WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ Debian GNU/Linux 3.0 http://secunia.com/product/143/ DESCRIPTION: Debian has issued an update for info2www. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed to info2www is not properly sanitised before being returned to users. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of a vulnerable site by tricking the user into following a specially crafted link or visit a malicious web site. SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.0 alias woody -- Source archives: http://security.debian.org/pool/updates/main/i/info2www/info2www_1.2.2.9-20woody1.dsc Size/MD5 checksum: 600 68a3d62f9ff13abaf1cd2b2ca479c8e9 http://security.debian.org/pool/updates/main/i/info2www/info2www_1.2.2.9-20woody1.diff.gz Size/MD5 checksum: 27216 d4bf5b04bfcaa304bbe18969346a281e http://security.debian.org/pool/updates/main/i/info2www/info2www_1.2.2.9.orig.tar.gz Size/MD5 checksum: 12407 2d79050502b938fae36d6d38e1d5084b Architecture independent components: http://security.debian.org/pool/updates/main/i/info2www/info2www_1.2.2.9-20woody1_all.deb Size/MD5 checksum: 34006 93914a2ed64150b8682e8e419f7878ed -- Debian GNU/Linux unstable alias sid -- Fixed in version 1.2.2.9-23. PROVIDED AND/OR DISCOVERED BY: Nicolas Gregoire ORIGINAL ADVISORY: http://www.debian.org/security/2005/dsa-711 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------