[Secure-testing-team] Bug#576308: OpenDcHub 0.8.1 Remote Code Execution Exploit
Moritz Muehlenhoff
jmm at debian.org
Fri Apr 2 20:13:42 UTC 2010
Package: opendchub
Version: OpenDcHub 0.8.1 Remote Code Execution Exploit
Severity: grave
Tags: security
This was reported to full-disclosure:
http://www.indahax.com/exploits/opendchub-0-8-1-remote-code-execution-exploit#more-600
Please get in touch with upstream for a fix.
Cheers,
Moritz
-- System Information:
Debian Release: squeeze/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.32-3-686 (SMP w/1 CPU core)
Locale: LANG=C, LC_CTYPE=de_DE.ISO-8859-15 at euro (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash
Versions of packages opendchub depends on:
ii libc6 2.10.2-6 Embedded GNU C Library: Shared lib
pn libcap1 <none> (no description available)
ii libperl5.10 5.10.1-11 shared Perl library
opendchub recommends no packages.
opendchub suggests no packages.
More information about the Secure-testing-team
mailing list