summaryrefslogtreecommitdiff
blob: 38f4823baff8f2d0091cdbe14a96e39f16e0b103 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200604-07">
  <title>Cacti: Multiple vulnerabilities in included ADOdb</title>
  <synopsis>
    Multiple vulnerabilities have been discovered in the ADOdb layer included
    in Cacti, potentially resulting in the execution of arbitrary code.
  </synopsis>
  <product type="ebuild">Cacti</product>
  <announced>2006-04-14</announced>
  <revised>2006-04-14: 01</revised>
  <bug>129284</bug>
  <access>remote</access>
  <affected>
    <package name="net-analyzer/cacti" auto="yes" arch="*">
      <unaffected range="ge">0.8.6h_p20060108-r2</unaffected>
      <vulnerable range="lt">0.8.6h_p20060108-r2</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    Cacti is a complete web-based frontend to rrdtool. ADOdb is a
    PHP-based database abstraction layer which is included in Cacti.
    </p>
  </background>
  <description>
    <p>
    Several vulnerabilities have been identified in the copy of ADOdb
    included in Cacti. Andreas Sandblad discovered a dynamic code
    evaluation vulnerability (CVE-2006-0147) and a potential SQL injection
    vulnerability (CVE-2006-0146). Andy Staudacher reported another SQL
    injection vulnerability (CVE-2006-0410), and Gulftech Security
    discovered multiple cross-site-scripting issues (CVE-2006-0806).
    </p>
  </description>
  <impact type="high">
    <p>
    Remote attackers could trigger these vulnerabilities by sending
    malicious queries to the Cacti web application, resulting in arbitrary
    code execution, database compromise through arbitrary SQL execution,
    and malicious HTML or JavaScript code injection.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All Cacti users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=net-analyzer/cacti-0.8.6h_p20060108-r2"</code>
  </resolution>
  <references>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0146">CVE-2006-0146</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0147">CVE-2006-0147</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0410">CVE-2006-0410</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0806">CVE-2006-0806</uri>
  </references>
  <metadata tag="requester" timestamp="2006-04-13T06:13:49Z">
    jaervosz
  </metadata>
  <metadata tag="submitter" timestamp="2006-04-13T16:58:52Z">
    koon
  </metadata>
  <metadata tag="bugReady" timestamp="2006-04-13T20:36:27Z">
    koon
  </metadata>
</glsa>