Lucene search

K
osvGoogleOSV:DSA-764-1
HistoryJul 21, 2005 - 12:00 a.m.

cacti - several

2005-07-2100:00:00
Google
osv.dev
4

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.042 Low

EPSS

Percentile

91.0%

Several vulnerabilities have been discovered in cacti, a round-robin
database (RRD) tool that helps create graphs from database
information. The Common Vulnerabilities and Exposures Project
identifies the following problems:

  • CAN-2005-1524
    Maciej Piotr Falkiewicz and an anonymous researcher discovered an
    input validation bug that allows an attacker to include arbitrary
    PHP code from remote sites which will allow the execution of
    arbitrary code on the server running cacti.

  • CAN-2005-1525
    Due to missing input validation cacti allows a remote attacker to
    insert arbitrary SQL statements.

  • CAN-2005-1526
    Maciej Piotr Falkiewicz discovered an input validation bug that
    allows an attacker to include arbitrary PHP code from remote sites
    which will allow the execution of arbitrary code on the server
    running cacti.

  • CAN-2005-2148
    Stefan Esser discovered that the update for the above mentioned
    vulnerabilities does not perform proper input validation to
    protect against common attacks.

  • CAN-2005-2149
    Stefan Esser discovered that the update for CAN-2005-1525 allows
    remote attackers to modify session information to gain privileges
    and disable the use of addslashes to protect against SQL
    injection.

For the old stable distribution (woody) these problems have been fixed in
version 0.6.7-2.5.

For the stable distribution (sarge) these problems have been fixed in
version 0.8.6c-7sarge2.

For the unstable distribution (sid) these problems have been fixed in
version 0.8.6f-2.

We recommend that you upgrade your cacti package.

CPENameOperatorVersion
cactieq0.8.6c-7

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.042 Low

EPSS

Percentile

91.0%