Mandriva Linux Security Advisory : sarg (MDVSA-2008:079)

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing a security update.

Description :

A stack-based buffer overflow in sarg (Squid Analysis Report
Generator) allowed remote attackers to execute arbitrary code via a
long Squid proxy server User-Agent header (CVE-2008-1167).

A cross-site scripting vulnerability in sarg version 2.x prior to
2.2.5 allowed remote attackers to inject arbitrary web script or HTML
via the User-Agent heder, which is not properly handled when
displaying the Squid proxy log (CVE-2008-1168).

In addition, a number of other fixes have been made such as making the
getword() function more robust which should prevent any overflows,
other segfaults have been fixed, and the useragent report is now more
consistent with the other reports.

The updated packages have been patched to correct these issues.

Solution :

Update the affected sarg package.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: Mandriva Local Security Checks

Nessus Plugin ID: 36436 (mandriva_MDVSA-2008-079.nasl)

Bugtraq ID:

CVE ID: CVE-2008-1167
CVE-2008-1168

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now