Debian Security Advisory

DSA-808-1 tdiary -- design error

Date Reported:
12 Sep 2005
Affected Packages:
tdiary
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2005-2411.
More information:

Yutaka Oiwa and Hiromitsu Takagi discovered a Cross-Site Request Forgery (CSRF) vulnerability in tdiary, a new generation weblog that can be exploited by remote attackers to alter the users information.

The old stable distribution (woody) does not contain tdiary packages.

For the stable distribution (sarge) this problem has been fixed in version 2.0.1-1sarge1.

For the unstable distribution (sid) this problem has been fixed in version 2.0.2-1.

We recommend that you upgrade your tdiary packages.

Fixed in:

Debian GNU/Linux 3.1 (sarge)

Source:
http://security.debian.org/pool/updates/main/t/tdiary/tdiary_2.0.1-1sarge1.dsc
http://security.debian.org/pool/updates/main/t/tdiary/tdiary_2.0.1-1sarge1.diff.gz
http://security.debian.org/pool/updates/main/t/tdiary/tdiary_2.0.1.orig.tar.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/t/tdiary/tdiary-contrib_2.0.1-1sarge1_all.deb
http://security.debian.org/pool/updates/main/t/tdiary/tdiary-mode_2.0.1-1sarge1_all.deb
http://security.debian.org/pool/updates/main/t/tdiary/tdiary-plugin_2.0.1-1sarge1_all.deb
http://security.debian.org/pool/updates/main/t/tdiary/tdiary-theme_2.0.1-1sarge1_all.deb
http://security.debian.org/pool/updates/main/t/tdiary/tdiary_2.0.1-1sarge1_all.deb

MD5 checksums of the listed files are available in the original advisory.