Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 30th, 2015
Linux Advisory Watch: March 27th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Debian: New egroupware packages fix remote command execution Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian A vulnerability has been identified in the xmlrpc library included in the egroupware package. This vulnerability could lead to the execution of arbitrary commands on the server running egroupware.
- ------------------------------------------------------------------------
Debian Security Advisory DSA 747-1                                     Michael Stone
July 10, 2005               
- ------------------------------------------------------------------------

Package        : egroupware
Vulnerability  : remote command execution
Problem type   : input validation error
Debian-specific: no
CVE Id(s)      : CAN-2005-1921

A vulernability has been identified in the xmlrpc library included in
the egroupware package. This vulnerability could lead to the execution
of arbitrary commands on the server running egroupware.

The old stable distribution (woody) did not include egroupware.

For the current stable distribution (sarge), this problem is fixed in

For the unstable distribution (sid), this problem is fixed in version

We recommend that you upgrade your egroupware package.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian 3.1 (sarge)
- ------------------

  sarge was released for alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.

  Source archives:
      Size/MD5 checksum: 12699187 462f5ea377c4d0c04f16ffe8037b9d6a
      Size/MD5 checksum:    33321 2ae91aca7f89d1f3d5f725fa09384ed8
      Size/MD5 checksum:     1285 1849e8a4639068df7ac9f8f72272ef86

  Architecture independent packages:
      Size/MD5 checksum:     4212 6edb07699896314d8c0ce641e2228cc5
      Size/MD5 checksum:    51144 e611af77c5bd0c4b75cd9227ca50e115
      Size/MD5 checksum:    37840 78e388f8967593e544992cc18fc47096
      Size/MD5 checksum:   486306 ff7956754ab17b48938bc290171ab6c6
      Size/MD5 checksum:   204810 0f4c3f9ce74980dc5102bbabb2909b49
      Size/MD5 checksum:    26322 88c9d54ae0e23842f0b59b3cdc3de55f
      Size/MD5 checksum:    50530 d9407cff76325b2e597d30b16b55f35b
      Size/MD5 checksum:    37916 a0c6fc6f8c2138e8377dc24933a45772
      Size/MD5 checksum:   148770 d96b5a43c0a29dd8dbc13d001831a45c
      Size/MD5 checksum:   115750 d94de6dbaf9135a6fb45a1f01ffc09f4
      Size/MD5 checksum:    17100 2b837171f92886b79dab136b4cbed1b0
      Size/MD5 checksum:   172670 e35d2a3af12432147711a39e31d0a194
      Size/MD5 checksum:    92442 a1e6eacb42d3cf26bc2fe22086ee2332
      Size/MD5 checksum:   255838 b00219a9f18f65b56cde18564dbcdfc6
      Size/MD5 checksum:  1486218 7b8b470bf2a5f2279a322723ff74d031
      Size/MD5 checksum:   202082 ef4836ce08f0edfba3d7d2dee6f13225
      Size/MD5 checksum:   124930 bfdacc1755efb6e43133808bf77a1200
      Size/MD5 checksum:   119060 6588409cc9526dca31479a4d1a464cb6
      Size/MD5 checksum:  3771642 078dcb7065c3ced38e7e837d15003dde
      Size/MD5 checksum:    31966 3f1306aa4e31ce8518a967d5b6c8de23
      Size/MD5 checksum:  1363034 bdc3797f41136a032488e458e090b729
      Size/MD5 checksum:   382010 4725c5ad39c9abf8ab116f8a5dd0bb57
      Size/MD5 checksum:    74732 2a08f46a7af3a0084426e317ffacf083
      Size/MD5 checksum:     6942 2504ff9fa488181edfd5484ebab583b0
      Size/MD5 checksum:    92404 18e426330d98178d6acf7b1f04e7a616
      Size/MD5 checksum:  1243590 14104d7117c1ddcfe4013e64cdf4f427
      Size/MD5 checksum:   302036 275669f1b8eae13a4fa091423506aa65
      Size/MD5 checksum:   139354 664038c40ad93e64daf975e5e50d3550
      Size/MD5 checksum:   275144 361b4166509e4dd861c907c2f9f846f5
      Size/MD5 checksum:    35878 069b89e524f57fff58dfa91e19380ee0
      Size/MD5 checksum:    99618 264116d3f03eddeae48e2ac1b5e74bb0
      Size/MD5 checksum:    53220 de815addc18f090c263b582db7025af3

- -------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.