Mandriva Linux Security Advisory : backuppc (MDVSA-2013:062)

This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing a security update.

Description :

Updated backuppc packages fix security vulnerabilities :

Cross-site scripting (XSS) vulnerability in RestoreFile.pm in BackupPC
3.1.0, 3.2.1, and possibly other earlier versions allows remote
attackers to inject arbitrary web script or HTML via the share
parameter in a RestoreFile action to index.cgi (CVE-2011-5081).

Cross-site scripting (XSS) vulnerability in View.pm in BackupPC 3.0.0,
3.1.0, 3.2.0, 3.2.1, and possibly earlier allows remote attackers to
inject arbitrary web script or HTML via the num parameter in a view
action to index.cgi, related to the log file viewer (CVE-2011-4923).

Also, This update package corrects/improves the definition of
variables in config.pl, the configuration file of backuppc: the
variables SshPath, SmbClientPath, NmbLookupPath, TarClientPath,
TopDir. As a result, backuppc should now run with the default values
installed by the Mageia package, modifications of config.pl should
only be required for defining site-specific settings.

Solution :

Update the affected backuppc package.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Mandriva Local Security Checks

Nessus Plugin ID: 66076 ()

Bugtraq ID: 47628
50406

CVE ID: CVE-2011-4923
CVE-2011-5081

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now