2024-06-28 13:17:52 +00:00

453 lines
21 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20161467",
"Version": "oval:org.altlinux.errata:def:20161467",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2016-1467: package `cacti` update to version 0.8.8h-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2016-1467",
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-1467",
"Source": "ALTPU"
},
{
"RefID": "BDU:2016-01051",
"RefURL": "https://bdu.fstec.ru/vul/2016-01051",
"Source": "BDU"
},
{
"RefID": "CVE-2013-5588",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5588",
"Source": "CVE"
},
{
"RefID": "CVE-2013-5589",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5589",
"Source": "CVE"
},
{
"RefID": "CVE-2014-2326",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-2326",
"Source": "CVE"
},
{
"RefID": "CVE-2014-2327",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-2327",
"Source": "CVE"
},
{
"RefID": "CVE-2014-2328",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-2328",
"Source": "CVE"
},
{
"RefID": "CVE-2014-2708",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-2708",
"Source": "CVE"
},
{
"RefID": "CVE-2014-2709",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-2709",
"Source": "CVE"
},
{
"RefID": "CVE-2014-4002",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-4002",
"Source": "CVE"
},
{
"RefID": "CVE-2014-5025",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-5025",
"Source": "CVE"
},
{
"RefID": "CVE-2014-5026",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-5026",
"Source": "CVE"
},
{
"RefID": "CVE-2014-5261",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-5261",
"Source": "CVE"
},
{
"RefID": "CVE-2014-5262",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-5262",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2665",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2665",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2967",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2967",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4342",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4342",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4454",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4454",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4634",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4634",
"Source": "CVE"
},
{
"RefID": "CVE-2015-8369",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8369",
"Source": "CVE"
},
{
"RefID": "CVE-2015-8377",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8377",
"Source": "CVE"
},
{
"RefID": "CVE-2015-8604",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8604",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2313",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2313",
"Source": "CVE"
},
{
"RefID": "CVE-2016-3172",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3172",
"Source": "CVE"
},
{
"RefID": "CVE-2016-3659",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3659",
"Source": "CVE"
},
{
"RefID": "CVE-2017-1000031",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000031",
"Source": "CVE"
},
{
"RefID": "CVE-2017-1000032",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000032",
"Source": "CVE"
}
],
"Description": "This update upgrades cacti to version 0.8.8h-alt1. \nSecurity Fix(es):\n\n * BDU:2016-01051: Уязвимость программного средства мониторинга сети Cacti, позволяющая нарушителю обойти существующие ограничения доступа\n\n * CVE-2013-5588: Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.8b and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the step parameter to install/index.php or (2) the id parameter to cacti/host.php.\n\n * CVE-2013-5589: SQL injection vulnerability in cacti/host.php in Cacti 0.8.8b and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.\n\n * CVE-2014-2326: Cross-site scripting (XSS) vulnerability in cdef.php in Cacti 0.8.7g, 0.8.8b, and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.\n\n * CVE-2014-2327: Cross-site request forgery (CSRF) vulnerability in Cacti 0.8.7g, 0.8.8b, and earlier allows remote attackers to hijack the authentication of users for unspecified commands, as demonstrated by requests that (1) modify binary files, (2) modify configurations, or (3) add arbitrary users.\n\n * CVE-2014-2328: lib/graph_export.php in Cacti 0.8.7g, 0.8.8b, and earlier allows remote authenticated users to execute arbitrary commands via shell metacharacters in unspecified vectors.\n\n * CVE-2014-2708: Multiple SQL injection vulnerabilities in graph_xport.php in Cacti 0.8.7g, 0.8.8b, and earlier allow remote attackers to execute arbitrary SQL commands via the (1) graph_start, (2) graph_end, (3) graph_height, (4) graph_width, (5) graph_nolegend, (6) print_source, (7) local_graph_id, or (8) rra_id parameter.\n\n * CVE-2014-2709: lib/rrd.php in Cacti 0.8.7g, 0.8.8b, and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified parameters.\n\n * CVE-2014-4002: Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.8b allow remote attackers to inject arbitrary web script or HTML via the (1) drp_action parameter to cdef.php, (2) data_input.php, (3) data_queries.php, (4) data_sources.php, (5) data_templates.php, (6) graph_templates.php, (7) graphs.php, (8) host.php, or (9) host_templates.php or the (10) graph_template_input_id or (11) graph_template_id parameter to graph_templates_inputs.php.\n\n * CVE-2014-5025: Cross-site scripting (XSS) vulnerability in data_sources.php in Cacti 0.8.8b allows remote authenticated users with console access to inject arbitrary web script or HTML via the name_cache parameter in a ds_edit action.\n\n * CVE-2014-5026: Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.8b allow remote authenticated users with console access to inject arbitrary web script or HTML via a (1) Graph Tree Title in a delete or (2) edit action; (3) CDEF Name, (4) Data Input Method Name, or (5) Host Templates Name in a delete action; (6) Data Source Title; (7) Graph Title; or (8) Graph Template Name in a delete or (9) duplicate action.\n\n * CVE-2014-5261: The graph settings script (graph_settings.php) in Cacti 0.8.8b and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a font size, related to the rrdtool commandline in lib/rrd.php.\n\n * CVE-2014-5262: SQL injection vulnerability in the graph settings script (graph_settings.php) in Cacti 0.8.8b and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.\n\n * CVE-2015-2665: Cross-site scripting (XSS) vulnerability in Cacti before 0.8.8d allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.\n\n * CVE-2015-2967: Cross-site scripting (XSS) vulnerability in settings.php in Cacti before 0.8.8d allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.\n\n * CVE-2015-4342: SQL injection vulnerability in Cacti before 0.8.8d allows remote attackers to execute arbitrary SQL commands via unspecified vectors involving a cdef id.\n\n * CVE-2015-4454: SQL injection vulnerability in the get_hash_graph_template function in lib/functions.php in Cacti before 0.8.8d allows remote attackers to execute arbitrary SQL commands via the graph_template_id parameter to graph_templates.php.\n\n * CVE-2015-4634: SQL injection vulnerability in graphs.php in Cacti before 0.8.8e allows remote attackers to execute arbitrary SQL commands via the local_graph_id parameter.\n\n * CVE-2015-8369: SQL injection vulnerability in include/top_graph_header.php in Cacti 0.8.8f and earlier allows remote attackers to execute arbitrary SQL commands via the rra_id parameter in a properties action to graph.php.\n\n * CVE-2015-8377: SQL injection vulnerability in the host_new_graphs_save function in graphs_new.php in Cacti 0.8.8f and earlier allows remote authenticated users to execute arbitrary SQL commands via crafted serialized data in the selected_graphs_array parameter in a save action.\n\n * CVE-2015-8604: SQL injection vulnerability in the host_new_graphs function in graphs_new.php in Cacti 0.8.8f and earlier allows remote authenticated users to execute arbitrary SQL commands via the cg_g parameter in a save action.\n\n * CVE-2016-2313: auth_login.php in Cacti before 0.8.8g allows remote authenticated users who use web authentication to bypass intended access restrictions by logging in as a user not in the cacti database.\n\n * CVE-2016-3172: SQL injection vulnerability in tree.php in Cacti 0.8.8g and earlier allows remote authenticated users to execute arbitrary SQL commands via the parent_id parameter in an item_edit action.\n\n * CVE-2016-3659: SQL injection vulnerability in graph_view.php in Cacti 0.8.8.g allows remote authenticated users to execute arbitrary SQL commands via the host_group_data parameter.\n\n * CVE-2017-1000031: SQL injection vulnerability in graph_templates_inputs.php in Cacti 0.8.8b allows remote attackers to execute arbitrary SQL commands via the graph_template_input_id and graph_template_id parameters.\n\n * CVE-2017-1000032: Cross-Site scripting (XSS) vulnerabilities in Cacti 0.8.8b allow remote attackers to inject arbitrary web script or HTML via the parent_id parameter to tree.php and drp_action parameter to data_sources.php.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2016-05-10"
},
"Updated": {
"Date": "2016-05-10"
},
"BDUs": [
{
"ID": "BDU:2016-01051",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2016-01051",
"Impact": "Low",
"Public": "20160413"
}
],
"CVEs": [
{
"ID": "CVE-2013-5588",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5588",
"Impact": "Low",
"Public": "20130829"
},
{
"ID": "CVE-2013-5589",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-89",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5589",
"Impact": "High",
"Public": "20130829"
},
{
"ID": "CVE-2014-2326",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-2326",
"Impact": "Low",
"Public": "20140327"
},
{
"ID": "CVE-2014-2327",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-352",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-2327",
"Impact": "Low",
"Public": "20140423"
},
{
"ID": "CVE-2014-2328",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-2328",
"Impact": "Low",
"Public": "20140423"
},
{
"ID": "CVE-2014-2708",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-89",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-2708",
"Impact": "High",
"Public": "20140410"
},
{
"ID": "CVE-2014-2709",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-2709",
"Impact": "High",
"Public": "20140423"
},
{
"ID": "CVE-2014-4002",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-4002",
"Impact": "Low",
"Public": "20140703"
},
{
"ID": "CVE-2014-5025",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-5025",
"Impact": "Low",
"Public": "20141020"
},
{
"ID": "CVE-2014-5026",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-5026",
"Impact": "Low",
"Public": "20141020"
},
{
"ID": "CVE-2014-5261",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-94",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-5261",
"Impact": "High",
"Public": "20140822"
},
{
"ID": "CVE-2014-5262",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-89",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-5262",
"Impact": "High",
"Public": "20140822"
},
{
"ID": "CVE-2015-2665",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2665",
"Impact": "Low",
"Public": "20150617"
},
{
"ID": "CVE-2015-2967",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2967",
"Impact": "Low",
"Public": "20150710"
},
{
"ID": "CVE-2015-4342",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-89",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4342",
"Impact": "High",
"Public": "20150617"
},
{
"ID": "CVE-2015-4454",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-89",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4454",
"Impact": "High",
"Public": "20150617"
},
{
"ID": "CVE-2015-4634",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-89",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4634",
"Impact": "High",
"Public": "20150811"
},
{
"ID": "CVE-2015-8369",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-89",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8369",
"Impact": "High",
"Public": "20151217"
},
{
"ID": "CVE-2015-8377",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CWE": "CWE-89",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8377",
"Impact": "Low",
"Public": "20151215"
},
{
"ID": "CVE-2015-8604",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-89",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8604",
"Impact": "High",
"Public": "20160411"
},
{
"ID": "CVE-2016-2313",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2313",
"Impact": "High",
"Public": "20160413"
},
{
"ID": "CVE-2016-3172",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-89",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3172",
"Impact": "High",
"Public": "20160412"
},
{
"ID": "CVE-2016-3659",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-89",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3659",
"Impact": "High",
"Public": "20160411"
},
{
"ID": "CVE-2017-1000031",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-89",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000031",
"Impact": "High",
"Public": "20170717"
},
{
"ID": "CVE-2017-1000032",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000032",
"Impact": "Low",
"Public": "20170717"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9",
"cpe:/o:alt:kworkstation:9.1",
"cpe:/o:alt:workstation:9.1",
"cpe:/o:alt:server:9.1",
"cpe:/o:alt:server-v:9.1",
"cpe:/o:alt:education:9.1",
"cpe:/o:alt:slinux:9.1",
"cpe:/o:alt:starterkit:9.1",
"cpe:/o:alt:kworkstation:9.2",
"cpe:/o:alt:workstation:9.2",
"cpe:/o:alt:server:9.2",
"cpe:/o:alt:server-v:9.2",
"cpe:/o:alt:education:9.2",
"cpe:/o:alt:slinux:9.2",
"cpe:/o:alt:starterkit:9.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20161467001",
"Comment": "cacti is earlier than 0:0.8.8h-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161467002",
"Comment": "cacti-config-php5 is earlier than 0:0.8.8h-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161467003",
"Comment": "cacti-doc is earlier than 0:0.8.8h-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161467004",
"Comment": "cacti-setup is earlier than 0:0.8.8h-alt1"
}
]
}
]
}
}
]
}