Lucene search

K
gentooGentoo FoundationGLSA-201009-04
HistorySep 07, 2010 - 12:00 a.m.

SARG: User-assisted execution of arbitrary code

2010-09-0700:00:00
Gentoo Foundation
security.gentoo.org
12

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.007 Low

EPSS

Percentile

80.6%

Background

SARG is the Squid Analysis Report Generator.

Description

Multiple vulnerabilities were discovered in SARG. For further information please consult the CVE entries referenced below.

Impact

These vulnerabilities might allow attackers to execute arbitrary code via unknown vectors.

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since April 18, 2009. It is likely that your system is already no longer affected by this issue.

Workaround

There is no known workaround at this time.

Resolution

All SARG users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-analyzer/sarg-2.2.5-r5"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-analyzer/sarg< 2.2.5-r5UNKNOWN

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.007 Low

EPSS

Percentile

80.6%