Executive Summary

Summary
Title New webcalendar packages fix remote code execution
Informations
Name DSA-799 First vendor Publication 2005-09-02
Vendor Debian Last vendor Modification 2005-09-02
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A trivially-exploitable bug was discovered in webcalendar that allows an attacker to execute arbitrary code with the privileges of the HTTP daemon on a system running a vulnerable version.

The old stable distribution (woody) does not contain the webcalendar package.

For the stable distribution (sarge) this problem has been fixed in version 0.9.45-4sarge2.

For the unstable distribution (sid) this problem will be fixed shortly.

We recommend that you upgrade your webcalendar package immediately.

Original Source

Url : http://www.debian.org/security/2005/dsa-799

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 4

OpenVAS Exploits

Date Description
2008-09-04 Name : FreeBSD Ports: webcalendar
File : nvt/freebsd_webcalendar.nasl
2008-01-17 Name : Debian Security Advisory DSA 799-1 (webcalendar)
File : nvt/deb_799_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
19283 WebCalendar functions.php includedir Parameter Remote File Inclusion

WebCalendar contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to functions.php not properly sanitizing user input supplied to the 'includedir' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.
18954 WebCalendar send_reminders.php includedir Parameter Remote File Inclusion

WebCalendar contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to send_reminders.php not properly sanitizing user input supplied to the 'includedir' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Nessus® Vulnerability Scanner

Date Description
2006-05-13 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_60f8fe7b3cfb11dabaa20004614cc33d.nasl - Type : ACT_GATHER_INFO
2005-09-06 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-799.nasl - Type : ACT_GATHER_INFO
2005-08-25 Name : The remote web server has a PHP script that is affected by a remote file incl...
File : webcalendar_includedir_file_includes.nasl - Type : ACT_ATTACK

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:34:18
  • Multiple Updates