Summary
The remote host is missing an update to apt-listchanges announced via advisory DSA 1465-2.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201465-2
Insight
Felipe Sateler discovered that apt-listchanges, a package change history notification tool, used unsafe paths when importing its python libraries.
This could allow the execution of arbitary shell commands if the root user executed the command in a directory which other local users may write to.
This security update fixes a regression in the previous one, which caused the package to fail to work.
For the stable distribution (etch), this problem has been fixed in version 2.72.5etch1.
For the old stable distribution (sarge), this problem was not present.
For the unstable distribution (sid), this problem has been fixed in version 2.82.
We recommend that you upgrade your apt-listchanges package.
Severity
Classification
-
CVE CVE-2008-0302 -
CVSS Base Score: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities