- --------------------------------------------------------------------------Debian Security Advisory DSA 897-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
November 15th, 2005                     http://www.debian.org/security/faq
- --------------------------------------------------------------------------Package        : phpsysinfo
Vulnerability  : programming errors
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2005-0870 CVE-2005-3347 CVE-2005-3348
Debian Bug     : 301118

Several vulnerabilities have been discovered in phpsysinfo, a PHP
based host information application.  The Common Vulnerabilities and
Exposures project identifies the following problems: 

CVE-2005-0870

    Maksymilian Arciemowicz discoverd several cross site scripting
    problems, of which not all were fixed in DSA 724.

CVE-2005-3347

    Christopher Kunz discovered that local variables get overwritten
    unconditionally and are trusted later, which could lead to the
    inclusion of arbitrary files.

CVE-2005-3348

    Christopher Kunz discovered that user-supplied input is used
    unsanitised, causing a HTTP Response splitting problem.

For the old stable distribution (woody) these problems have been fixed in
version 2.0-3woody3.

For the stable distribution (sarge) these problems have been fixed in
version 2.3-4sarge1.

For the unstable distribution (sid) these problems will be fixed soon.

We recommend that you upgrade your phpsysinfo package.


Upgrade Instructions
- --------------------wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------  Source archives:

          Size/MD5 checksum:      622 c6fe8cc0dece352dead56f7319e37191
          Size/MD5 checksum:     3091 e7ce790076394c0fc0ddd9bc2fba23cf
          Size/MD5 checksum:    48104 abd184ebc003aeba07d9945bb9c6ff0f

  Architecture independent components:

          Size/MD5 checksum:    42334 4991a7c22521888a9aba3db88e79b6ce


Debian GNU/Linux 3.1 alias sarge
- --------------------------------  Source archives:

          Size/MD5 checksum:      596 12c1913a974e30596f07729d8fb660f9
          Size/MD5 checksum:     9861 0b621fec1be1e26a5dfa160ce9612aac
          Size/MD5 checksum:   163674 8e9a2b7a099e26cbd85f140475512ccc

  Architecture independent components:

          Size/MD5 checksum:   164704 2ef5fb9eb652f24ecae3f5aa4967fa3d


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp:  dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

Debian: New phpsysinfo packages fix several vulnerabilities

November 15, 2005
Updated package.

Summary

Severity

Related News