Package: tdiary Version: 2.0.2+20060303-4.1 Severity: important Tags: security
Takagi Hiroshi has reported a vulnerability in tDiary, which can be exploited by malicious people to compromise vulnerable systems. An unspecified error within the sanitation of input can be exploited to execute arbitrary Ruby code. Successful exploitation reportedly depends on the product's configuration. The vulnerability is reported in version 2.0.3. Other versions may also be affected. Solution: Update to version 2.0.4. http://secunia.com/advisories/23465/ -- System Information: Debian Release: 4.0 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-3-486 Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8) regards, -- .''`. : :' : Alex de Oliveira Silva | enerv `. `' www.enerv.net `- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]