Package: tdiary
Version: 2.0.2+20060303-4.1
Severity: important
Tags: security

Takagi Hiroshi has reported a vulnerability in tDiary, which can be exploited 
by malicious people to compromise vulnerable systems.
An unspecified error within the sanitation of input can be exploited to execute 
arbitrary Ruby code.
Successful exploitation reportedly depends on the product's configuration.
The vulnerability is reported in version 2.0.3. Other versions may also be 
affected.

Solution:
Update to version 2.0.4.

http://secunia.com/advisories/23465/

-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-3-486
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8)


regards,
-- 
   .''`.  
  : :' :    Alex de Oliveira Silva | enerv
  `. `'     www.enerv.net
    `- 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to