-----BEGIN PGP SIGNATURE-----
wsB5BAABCAAjFiEE5rkwSLC9ntq84w397Dtram9gyMMFAmYMGtUFAwAAAAAACgkQ7Dtram9gyMPm
hAf+KRO5fEvcPbCZ0FoLAyNS5bmxOGty6YF0iYWGsOcVo9H2VS7yphR2LG/0QQXHVcrGlYILMZo5
/dfSUBrWFYYSFimoSNJlubuSRhpayly3x3KoMCUKZjT1O6zJLAhvLEPB7avXQQVLWNpBlmX3jTi2
ynNcbd2+d6j4DU7rSphzYEHPcxKZ8EGxncWWqx0QibqihAG9RTFbiIPjeHB3FFUDQ2pQjxRdWF0G
4VV88T6NOp+vKZQL/KOJTe7lx6O2AWRLzZfL08E5Ks/ljASr0tJXOQZp4m1PkRmvIKUGv+lM7SJs
d5MFOrgMr3JKFnMmEHQyqLX1Yeu4QxlH6+/4IIoSEQ==
=q9c5
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6720-1
April 02, 2024
cacti vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS (Available with Ubuntu Pro)
Summary:
Cacti could be made to crash if it received specially crafted
input.
Software Description:
- cacti: web interface for graphing of monitoring systems
Details:
Kentaro Kawane discovered that Cacti incorrectly handled user provided
input sent through request parameters to the graph_view.php script.
A remote authenticated attacker could use this issue to perform
SQL injection attacks.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS (Available with Ubuntu Pro):
cacti 1.2.19+ds1-2ubuntu1+esm1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6720-1
CVE-2023-39361
No comments:
Post a Comment