On Tue, Mar 08, 2011 at 02:02:31PM +0100, Hector Romojaro wrote:
> Hi,
> 
> About openacs and dotlrn packages, I don't think they are affected by
> any of the Xinha vulnerabilities [1][2][3]. The summary says:
> 
> "Xinha ships with several plugins that utilize PHP scripting for special
> usage, like the ImageManager or ExtendedFileManager. A 0-day security
> exploit has been reported available as of today that exploits the
> functionality of these plugins to upload malicious files to your
> webspace, to execute foreign code." [4]
> 
> It seems a PHP problem, and the proposed fix is just to remove a bunch
> of php files, so I guess the packages are safe because they don't use
> PHP at all, as well as the aolserver package. There is no way to execute
> that PHP code on openacs or dotlrn.
> 
> [1] http://security-tracker.debian.org/tracker/CVE-2011-1133
> [2] http://security-tracker.debian.org/tracker/CVE-2011-1134
> [3] http://security-tracker.debian.org/tracker/CVE-2011-1135
> [4]
> http://blog.s9y.org/archives/224-Important-Security-Update-Serendipity-1.5.5-released.html

Thanks, I've updated the security tracker.

Cheers,
        Moritz



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to