Boletines de Vulnerabilidades |
Cross-site scripting en htdig |
|
Clasificación de la vulnerabilidad |
|
Propiedad | Valor |
Nivel de Confianza | Oficial |
Impacto | Obtener acceso |
Dificultad | Experto |
Requerimientos del atacante | Acceso remoto sin cuenta a un servicio exotico |
Información sobre el sistema |
|
Propiedad | Valor |
Fabricant afectat | GNU/Linux |
Software afectado | htdig |
Descripción |
|
Se ha descubierto una vulnerabilidad de cross site scripting en htdig, una herramienta de búsqueda Web pensada para ser implementada en intranets. La explotación de esta vulnerabilidad podría permitir a un atacante remoto ejecutar código arbitrario mediante enlaces especialmente diseñados que aprovechen la vulnerabilidad en htdig y que la víctima debe visitar. |
|
Solución |
|
Actualización de software Debian Linux Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/h/htdig/htdig_3.1.6-3woody1.dsc http://security.debian.org/pool/updates/main/h/htdig/htdig_3.1.6-3woody1.diff.gz http://security.debian.org/pool/updates/main/h/htdig/htdig_3.1.6.orig.tar.gz Architecture independent http://security.debian.org/pool/updates/main/h/htdig/htdig-doc_3.1.6-3woody1_all.deb Alpha http://security.debian.org/pool/updates/main/h/htdig/htdig_3.1.6-3woody1_alpha.deb ARM http://security.debian.org/pool/updates/main/h/htdig/htdig_3.1.6-3woody1_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/h/htdig/htdig_3.1.6-3woody1_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/h/htdig/htdig_3.1.6-3woody1_ia64.deb HP Precision http://security.debian.org/pool/updates/main/h/htdig/htdig_3.1.6-3woody1_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/h/htdig/htdig_3.1.6-3woody1_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/h/htdig/htdig_3.1.6-3woody1_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/h/htdig/htdig_3.1.6-3woody1_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/h/htdig/htdig_3.1.6-3woody1_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/h/htdig/htdig_3.1.6-3woody1_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/h/htdig/htdig_3.1.6-3woody1_sparc.deb Red Hat Linux Red Hat Desktop (v. 4) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 4) https://rhn.redhat.com/ Mandrake Linux Mandrakelinux 10.0 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/htdig-3.2.0-0.8.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/htdig-devel-3.2.0-0.8.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/htdig-web-3.2.0-0.8.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/htdig-3.2.0-0.8.1.100mdk.src.rpm AMD64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/htdig-3.2.0-0.8.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/htdig-devel-3.2.0-0.8.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/htdig-web-3.2.0-0.8.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/htdig-3.2.0-0.8.1.100mdk.src.rpm Mandrakelinux 10.1 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/htdig-3.2.0-0.8.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/htdig-devel-3.2.0-0.8.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/htdig-web-3.2.0-0.8.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/htdig-3.2.0-0.8.1.101mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/htdig-3.2.0-0.8.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/htdig-devel-3.2.0-0.8.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/htdig-web-3.2.0-0.8.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/htdig-3.2.0-0.8.1.101mdk.src.rpm Corporate Server 2.1 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/htdig-3.2.0-0.7.1.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/htdig-devel-3.2.0-0.7.1.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/htdig-web-3.2.0-0.7.1.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/htdig-3.2.0-0.7.1.C21mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/htdig-3.2.0-0.7.1.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/htdig-devel-3.2.0-0.7.1.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/htdig-web-3.2.0-0.7.1.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/htdig-3.2.0-0.7.1.C21mdk.src.rpm Corporate Server 3.0 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/htdig-3.2.0-0.8.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/htdig-devel-3.2.0-0.8.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/htdig-web-3.2.0-0.8.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/htdig-3.2.0-0.8.1.C30mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/htdig-3.2.0-0.8.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/htdig-devel-3.2.0-0.8.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/htdig-web-3.2.0-0.8.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/SRPMS/htdig-3.2.0-0.8.1.C30mdk.src.rpm SCO OpenServer 5.0.7 ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.46/507 OpenServer 6.0.0 ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.46/600 UnixWare 7.1.3 ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.45/713 UnixWare 7.1.4 ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.45/714 |
|
Identificadores estándar |
|
Propiedad | Valor |
CVE | CAN-2005-0085 |
BID | |
Recursos adicionales |
|
Debian Security Advisory DSA 680-1 http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00058.html Red Hat Security Advisory RHSA-2005:090-050 https://rhn.redhat.com/errata/RHSA-2005-090.html Mandrakesoft Security Advisories MDKSA-2005:063 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:063 SCO Security Advisory (SCOSA-2005.45) ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.45/SCOSA-2005.45.txt SCO Security Advisory (SCOSA-2005.46) ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.46/SCOSA-2005.46.txt |
Histórico de versiones |
||
Versión | Comentario | Data |
1.0 | Aviso emitido | 2005-02-15 |
1.1 | Aviso emitido por Red Hat (RHSA-2005:090-05) | 2005-02-16 |
1.2 | Aviso emitido por Mandrake (MDKSA-2005:063) | 2005-04-01 |
1.3 | Aviso emitido por SCO (SCOSA-2005.46) | 2005-11-03 |
1.4 | Aviso emitido por SCO (SCOSA-2005.45) | 2005-11-28 |