-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 1250-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff January 17th, 2007 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : cacti Vulnerability : missing input sanitising Problem-Type : remote Debian-specific: no CVE ID : CVE-2006-6799 Debian Bug : 404818 It was discovered that cacti, a frontend to rrdtool, performs insufficient validation of data passed to the "cmd" script, which allows SQL injection and the execution of arbitrary shell commands. For the stable distribution (sarge) this problem has been fixed in version 0.8.6c-7sarge4. For the upcoming stable distribution (etch) this problem has been fixed in version 0.8.6i-3. For the unstable distribution (sid) this problem has been fixed in version 0.8.6i-3. We recommend that you upgrade your cacti package. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/c/cacti/cacti_0.8.6c-7sarge4.dsc Size/MD5 checksum: 595 afdce1f2bdbfc1aebfc501000ccb2bac http://security.debian.org/pool/updates/main/c/cacti/cacti_0.8.6c-7sarge4.diff.gz Size/MD5 checksum: 55933 4efcecdf5f5e90d65b0e00e6d762315c http://security.debian.org/pool/updates/main/c/cacti/cacti_0.8.6c.orig.tar.gz Size/MD5 checksum: 1046586 b4130300f671e773ebea3b8f715912c1 Architecture independent components: http://security.debian.org/pool/updates/main/c/cacti/cacti_0.8.6c-7sarge4_all.deb Size/MD5 checksum: 1059312 9bda882e046d818faa056d5e7dfaff71 These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show ' and http://packages.debian.org/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFFrmmXXm3vHE4uyloRAmCgAKCFq1G6/I/fO5JNez7gGj7uPLesKACfWY4T PD9r4ZoOCaEqVylSk4rXsn4= =eSGz -----END PGP SIGNATURE-----