Debian Security Advisory
DSA-711-1 info2www -- missing input sanitising
- Date Reported:
- 19 Apr 2005
- Affected Packages:
- info2www
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 281655.
In Mitre's CVE dictionary: CVE-2004-1341. - More information:
-
Nicolas Gregoire discovered a cross-site scripting vulnerability in info2www, a converter for info files to HTML. A malicious person could place a harmless looking link on the web that could cause arbitrary commands to be executed in the browser of the victim user.
For the stable distribution (woody) this problem has been fixed in version 1.2.2.9-20woody1.
For the unstable distribution (sid) this problem has been fixed in version 1.2.2.9-23.
We recommend that you upgrade your info2www package.
- Fixed in:
-
Debian GNU/Linux 3.0 (woody)
- Source:
- http://security.debian.org/pool/updates/main/i/info2www/info2www_1.2.2.9-20woody1.dsc
- http://security.debian.org/pool/updates/main/i/info2www/info2www_1.2.2.9-20woody1.diff.gz
- http://security.debian.org/pool/updates/main/i/info2www/info2www_1.2.2.9.orig.tar.gz
- http://security.debian.org/pool/updates/main/i/info2www/info2www_1.2.2.9-20woody1.diff.gz
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/i/info2www/info2www_1.2.2.9-20woody1_all.deb
MD5 checksums of the listed files are available in the original advisory.