Executive Summary
Summary | |
---|---|
Title | New awstats packages fix arbitrary command execution |
Informations | |||
---|---|---|---|
Name | DSA-892 | First vendor Publication | 2005-11-10 |
Vendor | Debian | Last vendor Modification | 2005-11-10 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Peter Vreugdenhil discovered that awstats, a featureful web server log analyser, passes user-supplied data to an eval() function, allowing remote attackers to execute arbitrary Perl commands. The old stable distribution (woody) is not affected by this problem. For the stable distribution (sarge) this problem has been fixed in version 6.4-1sarge1. For the unstable distribution (sid) this problem has been fixed in version 6.4-1.1. We recommend that you upgrade your awstats package. |
Original Source
Url : http://www.debian.org/security/2005/dsa-892 |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-35 | Leverage Executable Code in Nonexecutable Files |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200508-07 (awstats) File : nvt/glsa_200508_07.nasl |
2008-09-04 | Name : FreeBSD Ports: awstats File : nvt/freebsd_awstats1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 892-1 (awstats) File : nvt/deb_892_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
18696 | AWStats ShowInfoURL Arbitrary Perl Code Execution |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-892.nasl - Type : ACT_GATHER_INFO |
2006-05-13 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_e86fbb5f0d0411dabc080001020eed82.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-167-1.nasl - Type : ACT_GATHER_INFO |
2005-08-18 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200508-07.nasl - Type : ACT_GATHER_INFO |
2005-08-10 | Name : The remote web server contains a CGI script that allows execution of arbitrar... File : awstats_referer_cmd_exec.nasl - Type : ACT_ATTACK |
Alert History
Date | Informations |
---|---|
2014-02-17 11:34:38 |
|