Debians sikkerhedsbulletin
DSA-808-1 tdiary -- designfejl
- Rapporteret den:
- 12. sep 2005
- Berørte pakker:
- tdiary
- Sårbar:
- Ja
- Referencer i sikkerhedsdatabaser:
- I Mitres CVE-ordbog: CVE-2005-2411.
- Yderligere oplysninger:
-
Yutaka Oiwa og Hiromitsu Takagi har opdaget en såkaldt Cross-Site Request Forgery (CSRF)-sårbarhed i tdiary, en ny weblog-generation, der kunne udnyttes af fjernangribere til at ændre brugernes oplysninger.
Den gamle stabile distribution (woody) indeholder ikke tdiary-pakker.
I den stabile distribution (sarge) er dette problem rettet i version 2.0.1-1sarge1.
I den ustabile distribution (sid) er dette problem rettet i version 2.0.2-1.
Vi anbefaler at du opgraderer dine tdiary-pakker.
- Rettet i:
-
Debian GNU/Linux 3.1 (sarge)
- Kildekode:
- http://security.debian.org/pool/updates/main/t/tdiary/tdiary_2.0.1-1sarge1.dsc
- http://security.debian.org/pool/updates/main/t/tdiary/tdiary_2.0.1-1sarge1.diff.gz
- http://security.debian.org/pool/updates/main/t/tdiary/tdiary_2.0.1.orig.tar.gz
- http://security.debian.org/pool/updates/main/t/tdiary/tdiary_2.0.1-1sarge1.diff.gz
- Arkitekturuafhængig komponent:
- http://security.debian.org/pool/updates/main/t/tdiary/tdiary-contrib_2.0.1-1sarge1_all.deb
- http://security.debian.org/pool/updates/main/t/tdiary/tdiary-mode_2.0.1-1sarge1_all.deb
- http://security.debian.org/pool/updates/main/t/tdiary/tdiary-plugin_2.0.1-1sarge1_all.deb
- http://security.debian.org/pool/updates/main/t/tdiary/tdiary-theme_2.0.1-1sarge1_all.deb
- http://security.debian.org/pool/updates/main/t/tdiary/tdiary_2.0.1-1sarge1_all.deb
- http://security.debian.org/pool/updates/main/t/tdiary/tdiary-mode_2.0.1-1sarge1_all.deb
MD5-kontrolsummer for de listede filer findes i den originale sikkerhedsbulletin.