Executive Summary
Summary | |
---|---|
Title | AWStats vulnerability |
Informations | |||
---|---|---|---|
Name | USN-167-1 | First vendor Publication | 2005-08-11 |
Vendor | Ubuntu | Last vendor Modification | 2005-08-11 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects the following Ubuntu releases: Ubuntu 5.04 (Hoary Hedgehog) The following packages are affected: awstats The problem can be corrected by upgrading the affected package to version 6.3-1ubuntu0.1. In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Peter Vreugdenhil discovered a command injection vulnerability in AWStats. As part of the statistics reporting function, AWStats displays information about the most common referrer values that caused users to visit the website. Referer URLs could be crafted in a way that they contained arbitrary Perl code which would have been executed with the privileges of the web server as soon as some user visited the referrer statistics page. |
Original Source
Url : http://www.ubuntu.com/usn/USN-167-1 |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-35 | Leverage Executable Code in Nonexecutable Files |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200508-07 (awstats) File : nvt/glsa_200508_07.nasl |
2008-09-04 | Name : FreeBSD Ports: awstats File : nvt/freebsd_awstats1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 892-1 (awstats) File : nvt/deb_892_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
18696 | AWStats ShowInfoURL Arbitrary Perl Code Execution |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-892.nasl - Type : ACT_GATHER_INFO |
2006-05-13 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_e86fbb5f0d0411dabc080001020eed82.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-167-1.nasl - Type : ACT_GATHER_INFO |
2005-08-18 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200508-07.nasl - Type : ACT_GATHER_INFO |
2005-08-10 | Name : The remote web server contains a CGI script that allows execution of arbitrar... File : awstats_referer_cmd_exec.nasl - Type : ACT_ATTACK |
Alert History
Date | Informations |
---|---|
2014-02-17 12:01:14 |
|