[Secure-testing-team] Bug#698541: zabbix: CVE-2013-1364: possible to override LDAP configuration parameters via the API

Salvatore Bonaccorso carnil at debian.org
Sun Jan 20 07:24:44 UTC 2013


Package: zabbix
Severity: grave
Tags: security
Justification: user security hole

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Hi,

the following vulnerability was published for zabbix.

CVE-2013-1364[0]:
possible to override LDAP configuration parameters via the API

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] http://security-tracker.debian.org/tracker/CVE-2013-1364

Please adjust the affected versions in the BTS as needed.

Patches are available on the upstream BTS[1].

[1] https://support.zabbix.com/browse/ZBX-6097

Could you check if Debian package is affected, and in case also adjust
severity.

Regards,
Salvatore

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=0nFY
-----END PGP SIGNATURE-----



More information about the Secure-testing-team mailing list