[Secure-testing-team] Bug#576308: OpenDcHub 0.8.1 Remote Code Execution Exploit

Moritz Muehlenhoff jmm at debian.org
Fri Apr 2 20:13:42 UTC 2010


Package: opendchub
Version: OpenDcHub 0.8.1 Remote Code Execution Exploit
Severity: grave
Tags: security

This was reported to full-disclosure:

http://www.indahax.com/exploits/opendchub-0-8-1-remote-code-execution-exploit#more-600

Please get in touch with upstream for a fix.

Cheers,
        Moritz

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-3-686 (SMP w/1 CPU core)
Locale: LANG=C, LC_CTYPE=de_DE.ISO-8859-15 at euro (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash

Versions of packages opendchub depends on:
ii  libc6                         2.10.2-6   Embedded GNU C Library: Shared lib
pn  libcap1                       <none>     (no description available)
ii  libperl5.10                   5.10.1-11  shared Perl library

opendchub recommends no packages.

opendchub suggests no packages.





More information about the Secure-testing-team mailing list