Your message dated Sun, 14 Jan 2007 18:17:03 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#402140: fixed in phpbb2 2.0.21-6
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: phpbb2
Version: 2.0.21-5
Severity: important
Tags: security
Some vulnerabilities have been discovered in phpBB, which can be exploited by
malicious people to conduct cross-site request forgery attacks and cross-site
scripting attacks.
1) The application allows users to send messages via HTTP requests without
performing any validity checks to verify the request. This can be exploited to
send
messages to arbitrary users by e.g. tricking a target user into visiting a
malicious website.
2) Input passed to the form field "Message body" in privmsg.php is not properly
sanitised before it is returned to the user when sending messages to a
non-existent user. This can be exploited to execute arbitrary HTML and script
code in a user's browser session in context of an affected site.
Successful exploitation of the vulnerabilities requires that the target user is
logged in.
The vulnerabilities are confirmed in version 2.0.21. Other versions may also be
affected.
http://secunia.com/advisories/23283/
-- System Information:
Debian Release: 4.0
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-3-486
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8)
--- End Message ---
--- Begin Message ---
Source: phpbb2
Source-Version: 2.0.21-6
We believe that the bug you reported is fixed in the latest version of
phpbb2, which is due to be installed in the Debian FTP archive:
phpbb2-conf-mysql_2.0.21-6_all.deb
to pool/main/p/phpbb2/phpbb2-conf-mysql_2.0.21-6_all.deb
phpbb2-languages_2.0.21-6_all.deb
to pool/main/p/phpbb2/phpbb2-languages_2.0.21-6_all.deb
phpbb2_2.0.21-6.diff.gz
to pool/main/p/phpbb2/phpbb2_2.0.21-6.diff.gz
phpbb2_2.0.21-6.dsc
to pool/main/p/phpbb2/phpbb2_2.0.21-6.dsc
phpbb2_2.0.21-6_all.deb
to pool/main/p/phpbb2/phpbb2_2.0.21-6_all.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Thijs Kinkhorst <[EMAIL PROTECTED]> (supplier of updated phpbb2 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Sun, 14 Jan 2007 17:35:23 +0100
Source: phpbb2
Binary: phpbb2-languages phpbb2-conf-mysql phpbb2
Architecture: source all
Version: 2.0.21-6
Distribution: unstable
Urgency: high
Maintainer: Jeroen van Wolffelaar <[EMAIL PROTECTED]>
Changed-By: Thijs Kinkhorst <[EMAIL PROTECTED]>
Description:
phpbb2 - A fully featured and skinnable flat (non-threaded) webforum
phpbb2-conf-mysql - Automatic configurator for phpbb2 on MySQL database
phpbb2-languages - phpBB2 additional languages
Closes: 402140 402140 404160
Changes:
phpbb2 (2.0.21-6) unstable; urgency=high
.
* Selected patches from upstream 2.0.22 for security issues:
* CVE-2006-6421: Cross-site scripting (XSS) vulnerability in the private
message box implementation (Closes: #402140).
* CVE-2006-6841: Cross Site Request Forgery was possible with some forms.
* CVE-2006-6840: Prevent negative start parameter. Exploitability unknown,
but flagged by upstream as a security fix and a harmless change.
* CVE-2006-6839: Improve check for bad redirection targets, exploitability
unkown, but flagged by upstream as a security fix and a harmless change.
(Closes: #402140)
.
* Added German debconf translation by Matthias Julius (Closes: #404160).
Files:
b94900b3f585ed3320c60df4b3492ea6 759 web optional phpbb2_2.0.21-6.dsc
349ba9624634152409ecc322763fab44 89517 web optional phpbb2_2.0.21-6.diff.gz
3333c8da978798bd14a2bf31dfa0e66b 548038 web optional phpbb2_2.0.21-6_all.deb
be19e3a1481354ad2f44abf426d57fe4 53854 web extra
phpbb2-conf-mysql_2.0.21-6_all.deb
0a0cecc1becd98d759ee9aba16446c9f 2726338 web optional
phpbb2-languages_2.0.21-6_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFFql9VJdKMxZV9WM8RAkIpAJ0a1VER+VN9npy8aA40PBW+8pvGaQCfXAZ7
pf0SxZk33VqLOV8EgHbLdDA=
=EGMU
-----END PGP SIGNATURE-----
--- End Message ---