|Category:||Debian Local Security Checks|
|Title:||Debian Security Advisory DSA 2593-1 (moin - several vulnerabilities)|
|Summary:||It was discovered that missing input validation in the twikidraw and;anywikidraw actions can result in the execution of arbitrary code.;This security issue is being actively exploited.;;This update also addresses path traversal in AttachFile.|
It was discovered that missing input validation in the twikidraw and
anywikidraw actions can result in the execution of arbitrary code.
This security issue is being actively exploited.
This update also addresses path traversal in AttachFile.
moin on Debian Linux
For the stable distribution (squeeze), this problem has been fixed in
For the unstable distribution (sid), this problem has been fixed in
We recommend that you upgrade your moin packages.
Common Vulnerability Exposure (CVE) ID: CVE-2012-6082|
BugTraq ID: 57089
Common Vulnerability Exposure (CVE) ID: CVE-2012-6495
Debian Security Information: DSA-2593 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2012-6080
BugTraq ID: 57076
Common Vulnerability Exposure (CVE) ID: CVE-2012-6081
BugTraq ID: 57082
|Copyright||Copyright (C) 2013 Greenbone Networks GmbH http://greenbone.net|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.