Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2010.0241 New egroupware packages fix several vulnerabilities 12 March 2010 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: egroupware Publisher: Debian Operating System: Debian GNU/Linux 5 UNIX variants (UNIX, Linux, OSX) Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Cross-site Scripting -- Remote with User Interaction Resolution: Patch/Upgrade Original Bulletin: http://www.debian.org/security/2010/dsa-2013 Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running egroupware check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ------------------------------------------------------------------------ Debian Security Advisory DSA-2013-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff March 11, 2010 http://www.debian.org/security/faq - - ------------------------------------------------------------------------ Package : egroupware Vulnerability : several Problem type : remote Debian-specific: no CVE Id(s) : not yet available Debian Bug : 573279 Nahuel Grisolia discovered two vulnerabilities in Egroupware, a web-based groupware suite: Missing input sanitising in the spellchecker integration may lead to the execution of arbitrary commands and a cross-site scripting vulnerability was discovered in the login page. For the stable distribution (lenny), these problems have been fixed in version 1.4.004-2.dfsg-4.2. The upcoming stable distribution (squeeze), no longer contains egroupware packages. We recommend that you upgrade your egroupware packages. Upgrade instructions - - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 5.0 alias lenny - - -------------------------------- Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/e/egroupware/egroupware_1.4.004-2.dfsg-4.2.diff.gz Size/MD5 checksum: 35229 1da727f1fb571ac148883ff1cd0d270d http://security.debian.org/pool/updates/main/e/egroupware/egroupware_1.4.004-2.dfsg-4.2.dsc Size/MD5 checksum: 1775 72e364d1bfd007520f004bb62be49caf http://security.debian.org/pool/updates/main/e/egroupware/egroupware_1.4.004-2.dfsg.orig.tar.gz Size/MD5 checksum: 11597406 26012ca8c976dbf4137f5f5c7abcfdaf Architecture independent packages: http://security.debian.org/pool/updates/main/e/egroupware/egroupware-bookmarks_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 105886 548e844db769730c4e63a09046d6c6b7 http://security.debian.org/pool/updates/main/e/egroupware/egroupware-felamimail_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 334336 a8b1b304c76b0ce2ba07aef4d979ee2a http://security.debian.org/pool/updates/main/e/egroupware/egroupware-mydms_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 569314 ec321c8c1032fc5d563857d600f96667 http://security.debian.org/pool/updates/main/e/egroupware/egroupware-polls_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 41450 047af44eef33721e3e5600e2433d0999 http://security.debian.org/pool/updates/main/e/egroupware/egroupware-calendar_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 447966 b5a50e6ccbab7586351fccf3dc1dd497 http://security.debian.org/pool/updates/main/e/egroupware/egroupware-developer-tools_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 59252 0c2800cd5998eb8acccd6c4ab11a1f62 http://security.debian.org/pool/updates/main/e/egroupware/egroupware-etemplate_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 639436 d5a22274257572b18caa7503d9af72ed http://security.debian.org/pool/updates/main/e/egroupware/egroupware-emailadmin_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 92244 2e26a6b63744204b9e14944ed5ea727f http://security.debian.org/pool/updates/main/e/egroupware/egroupware-phpsysinfo_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 201340 f6925e13cba379934ee0498f92fc4596 http://security.debian.org/pool/updates/main/e/egroupware/egroupware_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 7738 682ddfca5073843b6f30298050762393 http://security.debian.org/pool/updates/main/e/egroupware/egroupware-resources_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 79552 629ded68172377ab350135900faaa251 http://security.debian.org/pool/updates/main/e/egroupware/egroupware-news-admin_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 69932 36654d065e20e04eaf39a108b94c6f43 http://security.debian.org/pool/updates/main/e/egroupware/egroupware-filemanager_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 171686 45d61216c4a2a2e7cc9dcfbc71b19e2e http://security.debian.org/pool/updates/main/e/egroupware/egroupware-registration_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 136528 85bef627512808e873cbd25040d6deaf http://security.debian.org/pool/updates/main/e/egroupware/egroupware-sitemgr_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 627560 0dc27f321b2a075b44e54fe12c6fb428 http://security.debian.org/pool/updates/main/e/egroupware/egroupware-phpbrain_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 143912 85d374aed2b1f462223c93cf13c1eb4b http://security.debian.org/pool/updates/main/e/egroupware/egroupware-core_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 4409348 03bf3cfab8fc4a8ccc34848551682d2e http://security.debian.org/pool/updates/main/e/egroupware/egroupware-infolog_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 273950 1aae22abbbab84bbc36713a7b2d7f9bb http://security.debian.org/pool/updates/main/e/egroupware/egroupware-tracker_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 89532 6e47505d8098b4e7b5e9e9b7c4c0eafa http://security.debian.org/pool/updates/main/e/egroupware/egroupware-wiki_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 119642 fabc08c73db4681e36b723719c5c2d66 http://security.debian.org/pool/updates/main/e/egroupware/egroupware-sambaadmin_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 27324 721b208efa3421232f30d809934aaf43 http://security.debian.org/pool/updates/main/e/egroupware/egroupware-addressbook_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 309896 2870dbd2fee65e5e16234483618566c1 http://security.debian.org/pool/updates/main/e/egroupware/egroupware-timesheet_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 67108 cbd37f7f1767cc185989dd4c9feb8ea4 http://security.debian.org/pool/updates/main/e/egroupware/egroupware-manual_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 34710 8dc500ad3fb1908439939f8474a69670 http://security.debian.org/pool/updates/main/e/egroupware/egroupware-projectmanager_1.4.004-2.dfsg-4.2_all.deb Size/MD5 checksum: 591664 71964dae44c79067d1032554d48fe48d These files will probably be moved into the stable distribution on its next update. - - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAkuZbrIACgkQXm3vHE4uylodkQCg5ZWY52QiqXBYxvlD/hgVpdyp SU4An19ugJi0wrU0tTSCBk/IUwFtwYp8 =L4GI - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFLmXmh/iFOrG6YcBERAoEHAJ4vZQPmGqIo4k4HNA8rl7yvJJuW6QCffRt5 E51/fTEChoBi1obCm5bpJO8= =nL5e -----END PGP SIGNATURE-----