Lucene search

K
debianDebianDEBIAN:DSA-1324-1:86168
HistoryJun 28, 2007 - 9:04 p.m.

[SECURITY] [DSA 1324-1] New hiki packages fix missing input sanitising

2007-06-2821:04:32
lists.debian.org
10

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

6.2 Medium

AI Score

Confidence

Low

0.032 Low

EPSS

Percentile

91.2%


Debian Security Advisory DSA-1324 [email protected]
http://www.debian.org/security/ Steve Kemp
June 28, 2007


Package : hiki
Vulnerability : missing input sanitising
Problem type : remote
Debian-specific: no
CVE Id(s) : CVE-2007-2836
Debian Bug : 430691

Kazuhiro Nishiyama found a vulnerability in hiki, a Wiki engine written
in Ruby, which could allow a remote attacker to delete arbitary files
which are writable to the Hiki user, via a specially crafted session
parameter.

For the stable distribution (etch), this problem has been fixed in version
0.8.6-1etch1.

For the unstable distribution (sid) this problem has been fixed in version
0.8.7-1.

We recommend that you upgrade your hiki (0.8.6-1etch1) package.

Upgrade instructions


wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian (stable)


Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

http://security.debian.org/pool/updates/main/h/hiki/hiki_0.8.6-1etch1.diff.gz
Size/MD5 checksum: 5418 b57f6debe38f903c7615d738f5030060
http://security.debian.org/pool/updates/main/h/hiki/hiki_0.8.6-1etch1.dsc
Size/MD5 checksum: 571 22358a8449ae12c19fe6a80f8607a82f
http://security.debian.org/pool/updates/main/h/hiki/hiki_0.8.6.orig.tar.gz
Size/MD5 checksum: 244885 990212929cabf29e72df10a5b76ff27d

Architecture independent packages:

http://security.debian.org/pool/updates/main/h/hiki/hiki_0.8.6-1etch1_all.deb
Size/MD5 checksum: 228092 fdbc68fca2b4939ceace21f282b0c2fb

These files will probably be moved into the stable distribution on
its next update.


For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: [email protected]
Package info: `apt-cache show <pkg>' and http://packages.debian.org/&lt;pkg&gt;

OSVersionArchitecturePackageVersionFilename
Debian4allhiki< 0.8.6-1etch1hiki_0.8.6-1etch1_all.deb

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

6.2 Medium

AI Score

Confidence

Low

0.032 Low

EPSS

Percentile

91.2%