Your message dated Mon, 17 Apr 2006 17:41:30 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#336582: fixed in phpbb2 2.0.13+1-6sarge2
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: phpbb2
Tags: security
Severity: grave
A new round of security issues in phpBB has been disclosed.
| After these weaknesses were found and disclosed to the vendor
| nearly 80 days ago, several problems with unitialised variables
| were discovered that allow XSS, SQL injection and even remote
| execution of arbitrary PHP code, when phpBB is used with
| register_globals turned on.
<http://www.hardened-php.net/advisory_172005.75.html>
Vendor advisory: <http://www.phpbb.com/phpBB/viewtopic.php?f=14&t=336756>
(This contains a lot of additional fixes; it's not clear which ones are
security-relevant.)
--- End Message ---
--- Begin Message ---
Source: phpbb2
Source-Version: 2.0.13+1-6sarge2
We believe that the bug you reported is fixed in the latest version of
phpbb2, which is due to be installed in the Debian FTP archive:
phpbb2-conf-mysql_2.0.13-6sarge2_all.deb
to pool/main/p/phpbb2/phpbb2-conf-mysql_2.0.13-6sarge2_all.deb
phpbb2-languages_2.0.13-6sarge2_all.deb
to pool/main/p/phpbb2/phpbb2-languages_2.0.13-6sarge2_all.deb
phpbb2_2.0.13+1-6sarge2.diff.gz
to pool/main/p/phpbb2/phpbb2_2.0.13+1-6sarge2.diff.gz
phpbb2_2.0.13+1-6sarge2.dsc
to pool/main/p/phpbb2/phpbb2_2.0.13+1-6sarge2.dsc
phpbb2_2.0.13-6sarge2_all.deb
to pool/main/p/phpbb2/phpbb2_2.0.13-6sarge2_all.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Thijs Kinkhorst <[EMAIL PROTECTED]> (supplier of updated phpbb2 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Wed, 30 Nov 2005 11:52:53 +0100
Source: phpbb2
Binary: phpbb2-languages phpbb2-conf-mysql phpbb2
Architecture: source all
Version: 2.0.13+1-6sarge2
Distribution: stable-security
Urgency: high
Maintainer: Jeroen van Wolffelaar <[EMAIL PROTECTED]>
Changed-By: Thijs Kinkhorst <[EMAIL PROTECTED]>
Description:
phpbb2 - A fully featured and skinneable flat (non-threaded) webforum
phpbb2-conf-mysql - Automatic configurator for phpbb2 on MySQL database
phpbb2-languages - phpBB2 additional languages
Closes: 335662 336582 336587
Changes:
phpbb2 (2.0.13+1-6sarge2) stable-security; urgency=high
.
* Security update by phpBB maintainers
* Backport fixes for the following issues announced by upstream and
independent researchers (Closes: #336582, #336587, #335662):
- fixed validation of topic type when posting.
- fixed potential to select images outside the specified path as avatars
or smilies.
- fixed ability to edit PM's you did not send.
- CVE-2005-3419, CVE-2005-3420: fixed inadquate signature field input
sanitising, which allowed for arbitrary code execution
- CVE-2005-3310: compare imagetype on avatar uploading to match the file
extension from uploaded file.
.
Additionally, the following three issues are fixed, though they are only a
threat when running with the heavily discouraged register_globals = off
setting:
- CVE-2005-3415: bypass protection mechanisms that deregister global
variables by setting both a GPC variable and a GLOBALS[] variable.
- CVE-2005-3416: bypass security checks by setting the $_SESSION and
$HTTP_SESSION_VARS variables to strings instead of arrays.
- CVE-2005-3418: Multiple cross-site scripting (XSS) vulnerabilities.
Files:
84a0dab5af965cf6ff418c2b2383a9ee 783 web optional phpbb2_2.0.13+1-6sarge2.dsc
e644237009e5eff92b86f21a5f6f4cbe 64580 web optional
phpbb2_2.0.13+1-6sarge2.diff.gz
f88101af29bf00db9a8fdb264e35d891 525514 web optional
phpbb2_2.0.13-6sarge2_all.deb
4cbfd2fe1e336214a3defddeff55ce65 37474 web extra
phpbb2-conf-mysql_2.0.13-6sarge2_all.deb
f71e21b77d9f5bffa076a25d6687b4c2 2873096 web optional
phpbb2-languages_2.0.13-6sarge2_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
Comment: Signed by Jeroen van Wolffelaar <[EMAIL PROTECTED]>
iD8DBQFDpgbUl2uISwgTVp8RAgcyAJ93wvWZCBowQ74CtZRAIOXZ1ZQw3QCgrYEu
iBIbdbFUbbhEctbUEWdfu0I=
=R/22
-----END PGP SIGNATURE-----
--- End Message ---