LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: December 12th, 2014
Linux Security Week: December 9th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandriva: 2012:132: glpi Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake Multiple cross-site request forgery (CSRF) and cross-site scripting (XSS) flaws has been found and corrected in GLPI (CVE-2012-4002, CVE-2012-4003). This advisory provides the latest version of GLPI (0.83.4) which are [More...]
 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2012:132
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : glpi
 Date    : August 15, 2012
 Affected: Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 Multiple cross-site request forgery (CSRF) and cross-site scripting
 (XSS) flaws has been found and corrected in GLPI (CVE-2012-4002,
 CVE-2012-4003).
 
 This advisory provides the latest version of GLPI (0.83.4) which are
 not vulnerable to these issues. Additionally the latest versions of
 the corresponding plugins are also being provided.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4002
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4003
 https://forge.indepnet.net/projects/glpi/versions/771
 _______________________________________________________________________

 Updated Packages:

 Mandriva Enterprise Server 5:
 1814c787ca48edf04916dea7173d75b1  mes5/i586/glpi-0.83.4-0.1mdvmes5.2.noarch.rpm
 f0182fefad437bf835e937fa08f7524d  mes5/i586/glpi-plugin-archires-2.0.1-0.1mdvmes5.2.noarch.rpm
 c28b0d2aca9066d855d98cb4c9e7a399  mes5/i586/glpi-plugin-datainjection-2.2.2-0.1mdvmes5.2.noarch.rpm
 c57d6d6d2811b0f4916153d7134a7fce  mes5/i586/glpi-plugin-fusioninventory-2.4.1-0.1mdvmes5.2.noarch.rpm
 9fa5d75025b57ddab307f58aa0b08c01  mes5/i586/glpi-plugin-fusioninventory-deploy-2.4.1-0.1mdvmes5.2.noarch.rpm
 e0c68a078cc2e0893f51c2e2f01cab5c  mes5/i586/glpi-plugin-fusioninventory-inventory-2.4.1-0.1mdvmes5.2.noarch.rpm
 5e445df107bb79252a7adc6f008380e1  mes5/i586/glpi-plugin-fusioninventory-snmp-2.4.1-0.1mdvmes5.2.noarch.rpm
 e91eb49e873c22ac51dd00640b408abd  mes5/i586/glpi-plugin-genericobject-2.1.3-0.1mdvmes5.2.noarch.rpm
 67f836f3c2d5646688da4237567585be  mes5/i586/glpi-plugin-manufacturersimports-1.5.2-0.1mdvmes5.2.noarch.rpm
 df39b7613a418c63035736d14e4c0060  mes5/i586/glpi-plugin-massocsimport-1.6.1-0.1mdvmes5.2.noarch.rpm
 a161d6a8c24197e62806e155e814a674  mes5/i586/glpi-plugin-racks-1.3.2-0.1mdvmes5.2.noarch.rpm
 efb1aace80562c0cd6ee10893c229126  mes5/i586/glpi-plugin-reports-1.6.1-0.1mdvmes5.2.noarch.rpm
 ee8a47d8b4f8e5add6442230dd27b8b1  mes5/i586/glpi-plugin-webservices-1.3.1-0.1mdvmes5.2.noarch.rpm 
 8ee3cdf1157502fc78e44c0279fd1eb1  mes5/SRPMS/glpi-0.83.4-0.1mdvmes5.2.src.rpm
 748ef67eba7afc7073ff2c449a23556c  mes5/SRPMS/glpi-plugin-archires-2.0.1-0.1mdvmes5.2.src.rpm
 c868ccc98ec30b70c242ca2b4ce9af99  mes5/SRPMS/glpi-plugin-datainjection-2.2.2-0.1mdvmes5.2.src.rpm
 bb6218d3a31661a23b673ce761130602  mes5/SRPMS/glpi-plugin-fusioninventory-2.4.1-0.1mdvmes5.2.src.rpm
 c393c7ccb7c44edbc18568690e9a92cd  mes5/SRPMS/glpi-plugin-genericobject-2.1.3-0.1mdvmes5.2.src.rpm
 720679a5e36829a853e859de43dd4e10  mes5/SRPMS/glpi-plugin-manufacturersimports-1.5.2-0.1mdvmes5.2.src.rpm
 c13c1ef282bf7559b3e8da6c36c7260e  mes5/SRPMS/glpi-plugin-massocsimport-1.6.1-0.1mdvmes5.2.src.rpm
 085c2b937d3d0790f718030b475aecb3  mes5/SRPMS/glpi-plugin-racks-1.3.2-0.1mdvmes5.2.src.rpm
 494574a8e0ec67a73c39d0722620c883  mes5/SRPMS/glpi-plugin-reports-1.6.1-0.1mdvmes5.2.src.rpm
 9855da6818ddf8926290810658c16685  mes5/SRPMS/glpi-plugin-webservices-1.3.1-0.1mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 75daf4e1060c8bbc344f191ab971e2da  mes5/x86_64/glpi-0.83.4-0.1mdvmes5.2.noarch.rpm
 697c288ed3dc263da55d1ed380e19126  mes5/x86_64/glpi-plugin-archires-2.0.1-0.1mdvmes5.2.noarch.rpm
 f55f2c976fb89b82e0be063b6810640f  mes5/x86_64/glpi-plugin-datainjection-2.2.2-0.1mdvmes5.2.noarch.rpm
 a9c16780f969fdfd5efb3aab2e966e9d  mes5/x86_64/glpi-plugin-fusioninventory-2.4.1-0.1mdvmes5.2.noarch.rpm
 44f0e8461d590aafa6dd6cf153a5ab8f  mes5/x86_64/glpi-plugin-fusioninventory-deploy-2.4.1-0.1mdvmes5.2.noarch.rpm
 4be879d2aae7b8a6742ff92f21c4ad4c  mes5/x86_64/glpi-plugin-fusioninventory-inventory-2.4.1-0.1mdvmes5.2.noarch.rpm
 7e7a17f2c24c381bf6f1ce405e9282bb  mes5/x86_64/glpi-plugin-fusioninventory-snmp-2.4.1-0.1mdvmes5.2.noarch.rpm
 f7bb3207a79e12ab82ef870dde3b26de  mes5/x86_64/glpi-plugin-genericobject-2.1.3-0.1mdvmes5.2.noarch.rpm
 3f3c321581cc07239c12eb890598f175  mes5/x86_64/glpi-plugin-manufacturersimports-1.5.2-0.1mdvmes5.2.noarch.rpm
 c6335bb89c1b2dd3dbf92e45c685528d  mes5/x86_64/glpi-plugin-massocsimport-1.6.1-0.1mdvmes5.2.noarch.rpm
 71d8f5f682a41ca6dc6ffbef82cb465d  mes5/x86_64/glpi-plugin-racks-1.3.2-0.1mdvmes5.2.noarch.rpm
 307e4f3bca7af137f0bde2bd0e8f40ca  mes5/x86_64/glpi-plugin-reports-1.6.1-0.1mdvmes5.2.noarch.rpm
 e6a49d1c10123869ec1b80c6cb69c43e  mes5/x86_64/glpi-plugin-webservices-1.3.1-0.1mdvmes5.2.noarch.rpm 
 8ee3cdf1157502fc78e44c0279fd1eb1  mes5/SRPMS/glpi-0.83.4-0.1mdvmes5.2.src.rpm
 748ef67eba7afc7073ff2c449a23556c  mes5/SRPMS/glpi-plugin-archires-2.0.1-0.1mdvmes5.2.src.rpm
 c868ccc98ec30b70c242ca2b4ce9af99  mes5/SRPMS/glpi-plugin-datainjection-2.2.2-0.1mdvmes5.2.src.rpm
 bb6218d3a31661a23b673ce761130602  mes5/SRPMS/glpi-plugin-fusioninventory-2.4.1-0.1mdvmes5.2.src.rpm
 c393c7ccb7c44edbc18568690e9a92cd  mes5/SRPMS/glpi-plugin-genericobject-2.1.3-0.1mdvmes5.2.src.rpm
 720679a5e36829a853e859de43dd4e10  mes5/SRPMS/glpi-plugin-manufacturersimports-1.5.2-0.1mdvmes5.2.src.rpm
 c13c1ef282bf7559b3e8da6c36c7260e  mes5/SRPMS/glpi-plugin-massocsimport-1.6.1-0.1mdvmes5.2.src.rpm
 085c2b937d3d0790f718030b475aecb3  mes5/SRPMS/glpi-plugin-racks-1.3.2-0.1mdvmes5.2.src.rpm
 494574a8e0ec67a73c39d0722620c883  mes5/SRPMS/glpi-plugin-reports-1.6.1-0.1mdvmes5.2.src.rpm
 9855da6818ddf8926290810658c16685  mes5/SRPMS/glpi-plugin-webservices-1.3.1-0.1mdvmes5.2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
The Difference Between Wi-Fi Security Protocols: WPA2-AES vs WPA2-TKIP
Segmenting for security: Five steps to protect your network
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.