Debian DSA-164-1 : cacti - arbitrary code execution

critical Nessus Plugin ID 15001

Synopsis

The remote Debian host is missing a security-related update.

Description

A problem in cacti, a PHP based frontend to rrdtool for monitoring systems and services, has been discovered. This could lead into cacti executing arbitrary program code under the user id of the web server.
This problem, however, is only persistent to users who already have administrator privileges in the cacti system.

This problem has been fixed by removing any dollar signs and backticks from the title string in version 0.6.7-2.1 for the current stable distribution (woody) and in version 0.6.8a-2 for the unstable distribution (sid). The old stable distribution (potato) is not affected since it doesn't contain the cacti package.

Solution

Upgrade the cacti package immediately.

See Also

http://www.debian.org/security/2002/dsa-164

Plugin Details

Severity: Critical

ID: 15001

File Name: debian_DSA-164.nasl

Version: 1.21

Type: local

Agent: unix

Published: 9/29/2004

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:cacti, cpe:/o:debian:debian_linux:3.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 9/10/2002

Vulnerability Publication Date: 9/3/2002

Reference Information

CVE: CVE-2002-1477, CVE-2002-1478

DSA: 164