Debian: New tutos packages fix multiple vulnerabilities
Posted by Benjamin D. Thomas   
Debian Joxean Koret discovered several security problems in tutos, a web-based team organization software. The Common Vulnerabilities and Exposures Project identifies the following problems...
- --------------------------------------------------------------------------
Debian Security Advisory DSA 980-1                     security@debian.org
http://www.debian.org/security/                         Moritz Muehlenhoff
February 22nd, 2006                     http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : tutos
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2004-2161 CVE-2004-2162
Debian Bug     : 318633

Joxean Koret discovered several security problems in tutos, a web-based
team organization software. The Common Vulnerabilities and Exposures Project
identifies the following problems:

 CVE-2004-2161

     An SQL injection vulnerability allows the execution of SQL commands
     through the link_id parameter in file_overview.php.

 CVE-2004-2162

     Cross-Site-Scripting vulnerabilities in the search function of the
     address book and in app_new.php allow the execution of web script
     code.

The old stable distribution (woody) does not contain tutos packages.

For the stable distribution (sarge) these problems have been fixed in
version 1.1.20031017-2+1sarge1.

The unstable distribution (sid) does no longer contain tutos packages.

We recommend that you upgrade your tutos package.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/t/tutos/tutos_1.1.20031017-2+1sarge1.dsc
      Size/MD5 checksum:      575 7babaefc5a7e57afc2fb421d5829c4cf
    http://security.debian.org/pool/updates/main/t/tutos/tutos_1.1.20031017-2+1sarge1.tar.gz
      Size/MD5 checksum:  4955293 c9c539f0d5504d69377e326870db18c3

  Architecture independent components:

    http://security.debian.org/pool/updates/main/t/tutos/tutos_1.1.20031017-2+1sarge1_all.deb
      Size/MD5 checksum:  4760050 39bb9b2f3e9655c7060f04a5dac83e09

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org