[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2008:079 -- Mandriva sarg

ID: oval:org.secpod.oval:def:301511Date: (C)2012-01-07   (M)2021-06-02
Class: PATCHFamily: unix




A stack-based buffer overflow in sarg allowed remote attackers to execute arbitrary code via a long Squid proxy server User-Agent header . A cross-site scripting vulnerability in sarg version 2.x prior to 2.2.5 allowed remote attackers to inject arbitrary web script or HTML via the User-Agent heder, which is not properly handled when displaying the Squid proxy log . In addition, a number of other fixes have been made such as making the getword function more robust which should prevent any overflows, other segfaults have been fixed, and the useragent report is now more consistent with the other reports. The updated packages have been patched to correct these issues.

Platform:
Mandriva Linux 2007.0
Mandriva Linux 2007.1
Mandriva Linux 2008.0
Product:
sarg
Reference:
MDVSA-2008:079
CVE-2008-1167
CVE-2008-1168
CVE    2
CVE-2008-1168
CVE-2008-1167
CPE    3
cpe:/o:mandriva:linux:2007.1
cpe:/o:mandriva:linux:2008.0
cpe:/o:mandriva:linux:2007.0

© SecPod Technologies