LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: October 24th, 2014
Linux Security Week: October 20th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Debian: ht://Check XSS vulnerability Print E-mail
User Rating:      How can I rate this item?
Posted by LinuxSecurity.com Team   
Debian The PHP interface displays information unchecked which was gathered from crawled external web servers. This could lead into a cross site scripting attack if somebody has control over the server responses of a remote web server which is crawled by ht://Check.

- --------------------------------------------------------------------------
Debian Security Advisory DSA 169-1                     security@debian.org 
http://www.debian.org/security/                             Martin Schulze
September 25th, 2002                     http://www.debian.org/security/faq
- --------------------------------------------------------------------------

[ Resent since this advisory did not appear in the list archive.
Also, this is the real DSA 169-1. ]

Package        : htcheck
Vulnerability  : cross site scripting
Problem-Type   : remote
Debian-specific: no

Ulf Harnhammer discovered a problem in ht://Check's PHP interface.
The PHP interface displays information unchecked which was gathered
from crawled external web servers.  This could lead into a cross site
scripting attack if somebody has control over the server responses of
a remote web server which is crawled by ht://Check.

This problem has been fixed in version 1.1-1.1 for the current stable
distribution (woody) and in version 1.1-1.2 for the unstable release
(sid).  The old stable release (potato) does not contain the htcheck
package.

We recommend that you upgrade your htcheck package immediately.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

     http://security.debian.org/pool/updates/main/h/htcheck/htcheck_1.1-1.1.dsc
      Size/MD5 checksum:      613 d21f5fbf771b87840340810783019bb4
     http://security.debian.org/pool/updates/main/h/htcheck/htcheck_1.1-1.1.diff.gz
      Size/MD5 checksum:    26394 191d7a90427dd27799ef1b8e71ade0a8
     http://security.debian.org/pool/updates/main/h/htcheck/htcheck_1.1.orig.tar.gz
      Size/MD5 checksum:   621515 53cd633f11cc38671d17d4dc68cbe926

  Architecture independent components:

     http://security.debian.org/pool/updates/main/h/htcheck/htcheck-php_1.1-1.1_all.deb
      Size/MD5 checksum:    42150 8714bfe5188922baf0026d1d09eaf657

  Alpha architecture:

     http://security.debian.org/pool/updates/main/h/htcheck/htcheck_1.1-1.1_alpha.deb
      Size/MD5 checksum:   332958 f65daba68e7874161f111b7c875cf32e

  ARM architecture:

     http://security.debian.org/pool/updates/main/h/htcheck/htcheck_1.1-1.1_arm.deb
      Size/MD5 checksum:   306162 a6f99ed393a6618e972cc2c2e9b538e2

  Intel IA-32 architecture:

     http://security.debian.org/pool/updates/main/h/htcheck/htcheck_1.1-1.1_i386.deb
      Size/MD5 checksum:   299164 d5116655ecba8997e38e75578bd090bf

  Intel IA-64 architecture:

     http://security.debian.org/pool/updates/main/h/htcheck/htcheck_1.1-1.1_ia64.deb
      Size/MD5 checksum:   345016 6f3c0c708ebbab80a2d62d8c2fe8d6ee

  HP Precision architecture:

     http://security.debian.org/pool/updates/main/h/htcheck/htcheck_1.1-1.1_hppa.deb
      Size/MD5 checksum:   324600 23530dceb3d48d0c7a925edc47ff2e89

  Motorola 680x0 architecture:

     http://security.debian.org/pool/updates/main/h/htcheck/htcheck_1.1-1.1_m68k.deb
      Size/MD5 checksum:   291574 cf88a2efd4e4478561c90a6f371039b7

  Big endian MIPS architecture:

     http://security.debian.org/pool/updates/main/h/htcheck/htcheck_1.1-1.1_mips.deb
      Size/MD5 checksum:   306856 a0a515062a27d143e462b4a20f7e1545

  Little endian MIPS architecture:

     http://security.debian.org/pool/updates/main/h/htcheck/htcheck_1.1-1.1_mipsel.deb
      Size/MD5 checksum:   304234 fd2cd262d9dbdc2d987a9f9690383d02

  PowerPC architecture:

     http://security.debian.org/pool/updates/main/h/htcheck/htcheck_1.1-1.1_powerpc.deb
      Size/MD5 checksum:   295642 162e7a347589186e8e8e158c7607a430

  IBM S/390 architecture:

     http://security.debian.org/pool/updates/main/h/htcheck/htcheck_1.1-1.1_s390.deb
      Size/MD5 checksum:   286584 1075cb5d014b048b10dc4d567563a399

  Sun Sparc architecture:

     http://security.debian.org/pool/updates/main/h/htcheck/htcheck_1.1-1.1_sparc.deb
      Size/MD5 checksum:   291184 e68969c143c341825d26a9a79a943d36


  These files will probably be moved into the stable distribution on
  its next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb  http://security.debian.org/ stable/updates main
For dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and  http://packages.debian.org/





 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.