Mandriva Update for MHonArc MDVSA-2011:003 (MHonArc)

Solution
Please Install the Updated Packages.
Insight
Multiple vulnerabilities has been found and corrected in MHonArc: MHonArc 2.6.16 allows remote attackers to cause a denial of service (CPU consumption) via start tags that are placed within other start tags, as demonstrated by a &amp lt bo&amp lt bo&amp lt bo&amp lt bo&amp lt body&amp gt dy&amp gt dy&amp gt dy&amp gt dy&amp gt sequence, a different vulnerability than CVE-2010-4524 (CVE-2010-1677). Cross-site scripting (XSS) vulnerability in lib/mhtxthtml.pl in MHonArc 2.6.16 allows remote attackers to inject arbitrary web script or HTML via a malformed start tag and end tag for a SCRIPT element, as demonstrated by &amp lt scr&amp lt body&amp gt ipt&amp gt and &amp lt /scr&amp lt body&amp gt ipt&amp gt sequences (CVE-2010-4524). Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&amp amp products_id=490 The updated packages have been upgraded to the latest version (2.6.18) which is not vulnerable to these issues.
Affected
MHonArc on Mandriva Linux 2009.0, Mandriva Linux 2009.0/X86_64, Mandriva Linux 2010.0, Mandriva Linux 2010.0/X86_64, Mandriva Linux 2010.1, Mandriva Linux 2010.1/X86_64, Mandriva Enterprise Server 5, Mandriva Enterprise Server 5/X86_64