Executive Summary
Summary | |
---|---|
Title | dtc security update |
Informations | |||
---|---|---|---|
Name | DSA-2179 | First vendor Publication | 2011-03-02 |
Vendor | Debian | Last vendor Modification | 2011-03-02 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Ansgar Burchardt discovered several vulnerabilities in DTC, a web control panel for admin and accounting hosting services. CVE-2011-0434 The bw_per_moth.php graph contains an SQL injection vulnerability. CVE-2011-0435 Insufficient checks in bw_per_month.php can lead to bandwidth usage information disclosure. CVE-2011-0436 After a registration, passwords are sent in cleartext email messages. CVE-2011-0437 Authenticated users could delete accounts using an obsolete interface which was incorrectly included in the package. This update introduces a new configuration option which controls the presence of cleartext passwords in email messages. The default is not to include cleartext passwords For the oldstable distribution (lenny), this problem has been fixed in version 0.29.17-1+lenny1. The stable distribution (squeeze) and the the testing distribution (wheezy) do not contain any dtc packages. For the unstable distribution (sid), this problem has been fixed in version 0.32.10-1. We recommend that you upgrade your dtc packages. |
Original Source
Url : http://www.debian.org/security/2011/dsa-2179 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
25 % | CWE-310 | Cryptographic Issues |
25 % | CWE-287 | Improper Authentication |
25 % | CWE-264 | Permissions, Privileges, and Access Controls |
25 % | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:12579 | |||
Oval ID: | oval:org.mitre.oval:def:12579 | ||
Title: | DSA-2179-1 dtc -- SQL injection | ||
Description: | Ansgar Burchardt discovered several vulnerabilities in DTC, a web control panel for admin and accounting hosting services. CVE-2011-0434 The bw_per_moth.php graph contains an SQL injection vulnerability. CVE-2011-0435 Insufficient checks in bw_per_month.php can lead to bandwidth usage information disclosure. CVE-2011-0436 After a registration, passwords are sent in cleartext email messages. CVE-2011-0437 Authenticated users could delete accounts using an obsolete interface which was incorrectly included in the package. This update introduces a new configuration option which controls the presence of cleartext passwords in email messages. The default is not to include cleartext passwords | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2179-1 CVE-2011-0434 CVE-2011-0435 CVE-2011-0436 CVE-2011-0437 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 | Product(s): | dtc |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2011-09-21 | Name : FreeBSD Ports: dtc File : nvt/freebsd_dtc.nasl |
2011-03-09 | Name : Debian Security Advisory DSA 2179-1 (dtc) File : nvt/deb_2179_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
72807 | Domain Technologie Control shared/inc/sql/ssh.php edssh_account Parameter Arb... DTC contains a flaw related to account management. The issue is triggered by a failure of the shared/inc/sql/ssh.php script to validate the 'edssh_account' parameter. This may allow an attacker to delete arbitrary accounts. |
72806 | Domain Technologie Control client/new_account_form.php Cleartext Email Passwo... DTC contains a flaw that may lead to an unauthorized information disclosure. Â The issue is triggered by the email transmission of cleartext passwords, which will disclose passwords to a remote attacker. |
72805 | Domain Technologie Control admin/bw_per_month.php Direct Request Bandwidth In... DTC contains a flaw that may lead to an unauthorized information disclosure. Â The issue is triggered by unrestricted direct access to admin/bw_per_month.php, which will disclose bandwidth information to a remote attacker. |
72804 | Domain Technologie Control client/bw_per_month.php Direct Request Bandwidth I... DTC contains a flaw that may lead to an unauthorized information disclosure. Â The issue is triggered by unrestricted direct access to client/bw_per_month.php, which will disclose bandwidth information to a remote attacker. |
72803 | Domain Technologie Control admin/bw_per_month.php cid Parameter SQL Injection DTC contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the admin/bw_per_month.php script not properly sanitizing user-supplied input to the cid parameter. This may allow an attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data. |
72802 | Domain Technologie Control client/bw_per_month.php cid Parameter SQL Injection DTC contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the client/bw_per_month.php script not properly sanitizing user-supplied input to the 'cid' parameter. This may allow an attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2011-08-15 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_879b0242c5b611e0abd10017f22d6707.nasl - Type : ACT_GATHER_INFO |
2011-03-03 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2179.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:29:55 |
|