108183 2003-07-23 19:09 /120 rader/ Mandrake Linux Security Team <security@linux-mandrake.com> Importerad: 2003-07-23 19:09 av Brevbäraren Extern mottagare: bugtraq@securityfocus.com Mottagare: Bugtraq (import) <5696> Ärende: MDKSA-2003:077 - Updated phpgroupware packages fix multiple vulnerabilities ------------------------------------------------------------ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ Mandrake Linux Security Update Advisory ________________________________________________________________________ Package name: phpgroupware Advisory ID: MDKSA-2003:077 Date: July 23rd, 2003 Affected versions: 8.2, 9.0, 9.1, Corporate Server 2.1 ________________________________________________________________________ Problem Description: Several vulnerabilities were discovered in all versions of phpgroupware prior to 0.9.14.006. This latest version fixes an exploitable condition in all versions that can be exploited remotely without authentication and can lead to arbitrary code execution on the web server. This vulnerability is being actively exploited. Version 0.9.14.005 fixed several other vulnerabilities including cross-site scripting issues that can be exploited to obtain sensitive information such as authentication cookies. This update provides the latest stable version of phpgroupware and all users are encouraged to update immediately. In addition, you should also secure your installation by including the following in your Apache configuration files: <Directory /var/www/html/phpgroupware> <Files ~ "\.inc\.php$"> Order allow,deny Deny from all </Files> </Directory> ________________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0577 http://www.security-corporation.com/articles-20030702-005.html ________________________________________________________________________ Updated Packages: Corporate Server 2.1: 978f7cd5a9fccdd629c77fb8bcf80014 corporate/2.1/RPMS/phpgroupware-0.9.14.006-0.1mdk.noarch.rpm 4af85affe60b60b4978d84e306ec3544 corporate/2.1/SRPMS/phpgroupware-0.9.14.006-0.1mdk.src.rpm Corporate Server 2.1/x86_64: 49562febf6a8815ffe2bda1f3a303c72 x86_64/corporate/2.1/RPMS/phpgroupware-0.9.14.006-0.1mdk.noarch.rpm 4af85affe60b60b4978d84e306ec3544 x86_64/corporate/2.1/SRPMS/phpgroupware-0.9.14.006-0.1mdk.src.rpm Mandrake Linux 8.2: 3380410fa9b2eae7cea1dbc71845dcfc 8.2/RPMS/phpgroupware-0.9.14.006-0.1mdk.noarch.rpm 4af85affe60b60b4978d84e306ec3544 8.2/SRPMS/phpgroupware-0.9.14.006-0.1mdk.src.rpm Mandrake Linux 8.2/PPC: 785099e51ac582c2c615d42059707c99 ppc/8.2/RPMS/phpgroupware-0.9.14.006-0.1mdk.noarch.rpm 4af85affe60b60b4978d84e306ec3544 ppc/8.2/SRPMS/phpgroupware-0.9.14.006-0.1mdk.src.rpm Mandrake Linux 9.0: 978f7cd5a9fccdd629c77fb8bcf80014 9.0/RPMS/phpgroupware-0.9.14.006-0.1mdk.noarch.rpm 4af85affe60b60b4978d84e306ec3544 9.0/SRPMS/phpgroupware-0.9.14.006-0.1mdk.src.rpm Mandrake Linux 9.1: 147ba122b3693850de36d2d33cbfe327 9.1/RPMS/phpgroupware-0.9.14.006-0.1mdk.noarch.rpm 4af85affe60b60b4978d84e306ec3544 9.1/SRPMS/phpgroupware-0.9.14.006-0.1mdk.src.rpm Mandrake Linux 9.1/PPC: 3e0684538b8165244e82703d9f8b2a26 ppc/9.1/RPMS/phpgroupware-0.9.14.006-0.1mdk.noarch.rpm 4af85affe60b60b4978d84e306ec3544 ppc/9.1/SRPMS/phpgroupware-0.9.14.006-0.1mdk.src.rpm ________________________________________________________________________ Bug IDs fixed (see https://qa.mandrakesoft.com for more information): ________________________________________________________________________ To upgrade automatically, use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. A list of FTP mirrors can be obtained from: http://www.mandrakesecure.net/en/ftp.php All packages are signed by MandrakeSoft for security. You can obtain the GPG public key of the Mandrake Linux Security Team by executing: gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98 Please be aware that sometimes it takes the mirrors a few hours to update. You can view other update advisories for Mandrake Linux at: http://www.mandrakesecure.net/en/advisories/ MandrakeSoft has several security-related mailing list services that anyone can subscribe to. Information on these lists can be obtained by visiting: http://www.mandrakesecure.net/en/mlist.php If you want to report vulnerabilities, please contact security_linux-mandrake.com Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <security linux-mandrake.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQE/HrTdmqjQ0CJFipgRAmWpAJ92/2nONE4gcPsc9mcw8zPFciWETwCeOe4O +5RiX8d7oI/jDqVeWC5ev7o= =czdE -----END PGP SIGNATURE----- (108183) /Mandrake Linux Security Team <security@linux-mandrake.com>/(Ombruten) 108188 2003-07-23 20:58 /14 rader/ Vincent Danen <vdanen@mandrakesoft.com> Importerad: 2003-07-23 20:58 av Brevbäraren Extern mottagare: announce@mandrakesecure.net Mottagare: Bugtraq (import) <5699> Ärende: MDKSA-2003:077 correction ------------------------------------------------------------ The advisory announced this morning (MDKSA-2003:077 for phpgroupware) contains an incorrect CVE name which referenced a mpg123 vulnerability. The correct CVE names are CAN-2003-0504 and CAN-2003-0582. My apologies for the confusion. -- MandrakeSoft Security; http://www.mandrakesecure.net/ Online Security Resource Book; http://linsec.ca/ "lynx -source http://linsec.ca/vdanen.asc | gpg --import" {FE6F2AFD : 88D8 0D23 8D4B 3407 5BD7 66F9 2043 D0E5 FE6F 2AFD} (108188) /Vincent Danen <vdanen@mandrakesoft.com>/(Ombruten) Bilaga (application/pgp-signature) i text 108189 108189 2003-07-23 20:58 /8 rader/ Vincent Danen <vdanen@mandrakesoft.com> Importerad: 2003-07-23 20:58 av Brevbäraren Extern mottagare: announce@mandrakesecure.net Mottagare: Bugtraq (import) <5700> Bilaga (text/plain) till text 108188 Ärende: Bilaga till: MDKSA-2003:077 correction ------------------------------------------------------------ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (Darwin) iD8DBQE/HspJIEPQ5f5vKv0RAltEAJ4zEVZuilZpoOC5s8LCN2YXnZbtJgCfbFoU 5O3kvUtnRRPGlDy4/L6O8eo= =U0hf -----END PGP SIGNATURE----- (108189) /Vincent Danen <vdanen@mandrakesoft.com>/--