[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 806-1] zoneminder security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : zoneminder
Version        : 1.25.0-4+deb7u1
CVE ID         : CVE-2016-10140

Information disclosure and authentication bypass vulnerability exists in the Apache HTTP Server configuration bundled with ZoneMinder v1.30.0, which allows a remote unauthenticated attacker to browse all directories in the web root, e.g., a remote unauthenticated attacker can view all CCTV images on the server.

For new installations, the new config file will be automatically installed. For existing installations, please follow the instructions in NEWS, which will be viewed during upgrade.

For Debian 7 "Wheezy", these problems have been fixed in version
1.25.0-4+deb7u1.

We recommend that you upgrade your zoneminder packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQJ8BAEBCgBmBQJYjgS0XxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ2MjAxRkJGRkRCQkRFMDc4MjJFQUJCOTY5
NkZDQUMwRDM4N0I1ODQ3AAoJEJb8rA04e1hHsA4P/RJvpd7KWTTFVIPESVcW/bR0
dTUqPcMuSpxD9Ya+13xUV9uj+igeRrGx61M5SvVi4IBDkpBXDnOO2doHD4MszC1/
ophaY75EeL0LtcdgQ0t/jcCC9wIHcoZAZdONXmr2oUfW+euOR5SYsDE0sKnCbkDE
BJaIWiDQoJ3gIAqXt6puLlMzLksfiZx8qQT/rGdf+aawEnJZJ8mk7hHCiaRQSRWU
PU6r2XopUwHtU746Xd7f61DKIXfY9DfZSWEoexvcvIeamQeqhmn2cr1+4H3OLWUB
2OjdhC10yIxoYU99GsE5nT5228g2zAw3q5vEyQ9ofnGLnCO/iAk1YRQF3fs+UgM4
cgHWmJ2pI4o54Nf4CbF8+F3QPP2Ym6e/sueex76x8bpbq4KiSJNxXfv2LtW9H9S+
02okJQKZIx/VEX3kRMqBNL0HnHarcdbZ0x80HkvU8S1P2QhUKuLema9Jow7z2xUe
Y3YA2SS4ZZMTYPUgDWs4qDFZKYeOogKg2Bj26XCS4aLsrUgKBqEFlB/lvDrHWYY7
5qUfvbLwSqy1FfnG3+tNZ6OhNBjQwehYulxD68Mf7tjld/DL46ER56aQw8fyTtBO
QWSkciDalxeYbydWyiL6Q+1ZLSmaHX6m9fnY+kqbAepvn+WlTWMnH7USoN0rgspD
VXKyZXQY53R2Ds3i36gq
=W2dT
-----END PGP SIGNATURE-----


Reply to: