[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3794-3 munin -- munin

ID: oval:org.secpod.oval:def:602799Date: (C)2017-03-09   (M)2021-09-13
Class: PATCHFamily: unix




The update for munin issued as DSA-3794-2 caused a regression leading to Perl warnings being appended to the munin-cgi-graph log file. Updated packages are now available to correct this issue. For reference, the original advisory text follows. Stevie Trujillo discovered a local file write vulnerability in munin, a network-wide graphing framework, when CGI graphs are enabled. GET parameters are not properly handled, allowing to inject options into munin-cgi-graph and overwriting any file accessible by the user running the cgi-process.

Platform:
Debian 8.x
Product:
munin
Reference:
DSA-3794-3
CPE    2
cpe:/o:debian:debian_linux:8.x
cpe:/a:munin-monitoring:munin

© SecPod Technologies