Summary
The remote host is missing an update to cacti
announced via advisory DSA 164-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20164-1
Insight
A problem in cacti, a PHP based frontend to rrdtool for monitoring systems and services, has been discovered. This could lead into cacti executing arbitrary program code under the user id of the web server.
This problem, however, is only persistant to users who already have administrator privileges in the cacti system.
This problem has been fixed by removing any dollar signs and backticks from the title string in version 0.6.7-2.1 for the current stable distribution (woody) and in version 0.6.8a-2 for the unstable distribution (sid). The old stable distribution (potato) is not affected since it doesn't contain the cacti package.
We recommend that you upgrade your cacti package immediately.
Severity
Classification
-
CVE CVE-2002-1477, CVE-2002-1478 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities