Mandriva Linux Security Advisory : sarg (MDVSA-2008:079)

critical Nessus Plugin ID 36436

Synopsis

The remote Mandriva Linux host is missing a security update.

Description

A stack-based buffer overflow in sarg (Squid Analysis Report Generator) allowed remote attackers to execute arbitrary code via a long Squid proxy server User-Agent header (CVE-2008-1167).

A cross-site scripting vulnerability in sarg version 2.x prior to 2.2.5 allowed remote attackers to inject arbitrary web script or HTML via the User-Agent heder, which is not properly handled when displaying the Squid proxy log (CVE-2008-1168).

In addition, a number of other fixes have been made such as making the getword() function more robust which should prevent any overflows, other segfaults have been fixed, and the useragent report is now more consistent with the other reports.

The updated packages have been patched to correct these issues.

Solution

Update the affected sarg package.

Plugin Details

Severity: Critical

ID: 36436

File Name: mandriva_MDVSA-2008-079.nasl

Version: 1.15

Type: local

Published: 4/23/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:sarg, cpe:/o:mandriva:linux:2007, cpe:/o:mandriva:linux:2007.1, cpe:/o:mandriva:linux:2008.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 3/27/2008

Reference Information

CVE: CVE-2008-1167, CVE-2008-1168

CWE: 119, 79

MDVSA: 2008:079