Articles / Debian: New tutos packages …

Debian: New tutos packages fix multiple vulnerabilities

Joxean Koret discovered several security problems in tutos, a web-based team organization software. An SQL injection vulnerability allows the execution of SQL commands through the link_id parameter in file_overview.php. Cross-Site-Scripting vulnerabilities in the search function of the address book and in app_new.php allow the execution of web script code. Fixed packages are available from security.debian.org.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 980-1                     security@debian.org
http://www.debian.org/security/                         Moritz Muehlenhoff
February 22nd, 2006                     http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : tutos
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2004-2161 CVE-2004-2162
Debian Bug     : 318633

Joxean Koret discovered several security problems in tutos, a web-based
team organization software. The Common Vulnerabilities and Exposures Project
identifies the following problems:

 CVE-2004-2161

    An SQL injection vulnerability allows the execution of SQL commands
    through the link_id parameter in file_overview.php.

 CVE-2004-2162

    Cross-Site-Scripting vulnerabilities in the search function of the
    address book and in app_new.php allow the execution of web script
    code.

The old stable distribution (woody) does not contain tutos packages.

For the stable distribution (sarge) these problems have been fixed in
version 1.1.20031017-2+1sarge1.

The unstable distribution (sid) does no longer contain tutos packages.

We recommend that you upgrade your tutos package.


Upgrade Instructions
- --------------------

wget url
       will fetch the file for you
dpkg -i file.deb
       will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
       will update the internal database
apt-get upgrade
       will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

 Source archives:

   http://security.debian.org/pool/updates/main/t/tutos/tutos_1.1.20031017-2+1sarge1.dsc
     Size/MD5 checksum:      575 7babaefc5a7e57afc2fb421d5829c4cf
   http://security.debian.org/pool/updates/main/t/tutos/tutos_1.1.20031017-2+1sarge1.tar.gz
     Size/MD5 checksum:  4955293 c9c539f0d5504d69377e326870db18c3

 Architecture independent components:

   http://security.debian.org/pool/updates/main/t/tutos/tutos_1.1.20031017-2+1sarge1_all.deb
     Size/MD5 checksum:  4760050 39bb9b2f3e9655c7060f04a5dac83e09

 These files will probably be moved into the stable distribution on
 its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iQCVAwUBQ/x14A0hVr09l8FJAQL8JgQAyypfHSIb4USUNyXZ2WLzVrmdHGFW9KbS
xUWFZ9uEkC/AH6i1d/eQ/3Prqy52xHlIIkv5DbLQUg35Q8pxqp+dAZLoU0NrLINv
To0KqtYp/DzZ7Elk0zv9wWDgUiNec2KX7qc2P2BmUZV7KbP4D1XVvEthELXeAgBB
I8Ojlecr83A=
=Chb3
-----END PGP SIGNATURE-----
Screenshot

Project Spotlight

Kigo Video Converter Ultimate for Mac

A tool for converting and editing videos.

Screenshot

Project Spotlight

Kid3

An efficient tagger for MP3, Ogg/Vorbis, and FLAC files.