Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Debian Security Advisory DSA 080-1 (htdig)

Information

Severity

Severity

Medium

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

6.4

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:N/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

16 years ago

Modified

Modified

6 years ago

Summary

The remote host is missing an update to htdig announced via advisory DSA 080-1.

Insight

Insight

Nergal reported a vulnerability in the htsearch program which is distributed as part of the ht://Dig package, a indexing and searching system for small domains or intranets. Using former versions it was able to pass the parameter `-c' to the cgi program in order to use a different configuration file. A malicious user could point htsearch to a file like `/dev/zero' and let the server run in an endless loop, trying to read config parameters. If the user has write permission on the server he can point the program to it and retrive any file readable by the webserver user id. This problem has been fixed in version of 3.1.5-2.1 for Debian GNU/Linux 2.2. We recommend that you upgrade your htdig package immediately.

Solution

Solution

https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20080-1

Common Vulnerabilities and Exposures (CVE)