LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: December 19th, 2014
Linux Advisory Watch: December 12th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandrake: Updated htdig packages fix Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake A cross-site scripting vulnerability in ht://dig was discovered by Michael Krax. The updated packages have been patched to correct this issue.
 _______________________________________________________________________

                 Mandrakelinux Security Update Advisory
 _______________________________________________________________________

 Package name:           htdig
 Advisory ID:            MDKSA-2005:063
 Date:                   March 31st, 2005

 Affected versions:	 10.0, 10.1, Corporate 3.0,
			 Corporate Server 2.1
 ______________________________________________________________________

 Problem Description:

 A cross-site scripting vulnerability in ht://dig was discovered by
 Michael Krax. The updated packages have been patched to correct this
 issue.
 _______________________________________________________________________

 References:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0085
 ______________________________________________________________________

 Updated Packages:
  
 Mandrakelinux 10.0:
 6228437a3ee59911e0473bb587182722  10.0/RPMS/htdig-3.2.0-0.8.1.100mdk.i586.rpm
 9e2e6d19c955675b902867ebd4a532ac  10.0/RPMS/htdig-devel-3.2.0-0.8.1.100mdk.i586.rpm
 9d2c9514b9f841e29d355f2231fbf2bf  10.0/RPMS/htdig-web-3.2.0-0.8.1.100mdk.i586.rpm
 99444f90c5fd587b25a4a22c1766dbf5  10.0/SRPMS/htdig-3.2.0-0.8.1.100mdk.src.rpm

 Mandrakelinux 10.0/AMD64:
 8dda857b8c800baad5829e9967da79cf  amd64/10.0/RPMS/htdig-3.2.0-0.8.1.100mdk.amd64.rpm
 a0fc783208512e499dfb35313fae0542  amd64/10.0/RPMS/htdig-devel-3.2.0-0.8.1.100mdk.amd64.rpm
 29e335343d2ff49d8ec6114dd575be82  amd64/10.0/RPMS/htdig-web-3.2.0-0.8.1.100mdk.amd64.rpm
 99444f90c5fd587b25a4a22c1766dbf5  amd64/10.0/SRPMS/htdig-3.2.0-0.8.1.100mdk.src.rpm

 Mandrakelinux 10.1:
 a0409063ca738742cad98d32180982cf  10.1/RPMS/htdig-3.2.0-0.8.1.101mdk.i586.rpm
 976234e520943c0ce3218dd22a86663e  10.1/RPMS/htdig-devel-3.2.0-0.8.1.101mdk.i586.rpm
 84e9b288b4508cfff0b9cabb729818cc  10.1/RPMS/htdig-web-3.2.0-0.8.1.101mdk.i586.rpm
 b1939ad4e0ab56c625953a96add55759  10.1/SRPMS/htdig-3.2.0-0.8.1.101mdk.src.rpm

 Mandrakelinux 10.1/X86_64:
 ce24c06a0ac118969fd944ae917e3e72  x86_64/10.1/RPMS/htdig-3.2.0-0.8.1.101mdk.x86_64.rpm
 c32ff976cb9445350ef5763ae8ab0adb  x86_64/10.1/RPMS/htdig-devel-3.2.0-0.8.1.101mdk.x86_64.rpm
 1631e0ced4511d6f66cd118bf0a53ddb  x86_64/10.1/RPMS/htdig-web-3.2.0-0.8.1.101mdk.x86_64.rpm
 b1939ad4e0ab56c625953a96add55759  x86_64/10.1/SRPMS/htdig-3.2.0-0.8.1.101mdk.src.rpm

 Corporate Server 2.1:
 940eb22faad5b37005a2045030014ca3  corporate/2.1/RPMS/htdig-3.2.0-0.7.1.C21mdk.i586.rpm
 0c4292b7c83c327568dc3fc87eb65daa  corporate/2.1/RPMS/htdig-devel-3.2.0-0.7.1.C21mdk.i586.rpm
 259bb9d4924855da71f188e5a1c9e48e  corporate/2.1/RPMS/htdig-web-3.2.0-0.7.1.C21mdk.i586.rpm
 c3706f63bdd0d924f5e6582f16097c40  corporate/2.1/SRPMS/htdig-3.2.0-0.7.1.C21mdk.src.rpm

 Corporate Server 2.1/X86_64:
 b60111b0cccd21d0219e56943872954d  x86_64/corporate/2.1/RPMS/htdig-3.2.0-0.7.1.C21mdk.x86_64.rpm
 2234c1266e831e9a907bd905cfafe988  x86_64/corporate/2.1/RPMS/htdig-devel-3.2.0-0.7.1.C21mdk.x86_64.rpm
 60a05a4fa98a0ed0615d14a966997878  x86_64/corporate/2.1/RPMS/htdig-web-3.2.0-0.7.1.C21mdk.x86_64.rpm
 c3706f63bdd0d924f5e6582f16097c40  x86_64/corporate/2.1/SRPMS/htdig-3.2.0-0.7.1.C21mdk.src.rpm

 Corporate 3.0:
 6c581ad824ed274ecbfa95d3cb4b3f21  corporate/3.0/RPMS/htdig-3.2.0-0.8.1.C30mdk.i586.rpm
 8c1e110d09016bbebc6a8705c63b3c52  corporate/3.0/RPMS/htdig-devel-3.2.0-0.8.1.C30mdk.i586.rpm
 effe6251329eedb8aaaefa16852737a5  corporate/3.0/RPMS/htdig-web-3.2.0-0.8.1.C30mdk.i586.rpm
 e2d122279a783d148c7535b6e69f1914  corporate/3.0/SRPMS/htdig-3.2.0-0.8.1.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 5c643cf858ab77ef76c50c156b4c97f8  x86_64/corporate/3.0/RPMS/htdig-3.2.0-0.8.1.C30mdk.x86_64.rpm
 6a2bb83857fdfcf7e88de032bbb36722  x86_64/corporate/3.0/RPMS/htdig-devel-3.2.0-0.8.1.C30mdk.x86_64.rpm
 ae1d1d19a94c5ab808033794499a7d2f  x86_64/corporate/3.0/RPMS/htdig-web-3.2.0-0.8.1.C30mdk.x86_64.rpm
 e2d122279a783d148c7535b6e69f1914  x86_64/corporate/3.0/SRPMS/htdig-3.2.0-0.8.1.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandrakesoft for security.  You can obtain
 the GPG public key of the Mandrakelinux Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandrakelinux at:

  http://www.mandrakesoft.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
Report: U.S. planning “proportional response” to Sony hack, blamed on North Korea
Heartbleed, Shellshock, Tor and more: The 13 biggest security stories of 2014
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.