Package: spip Severity: normal Some more SPIP vulnerabilities released today, fresh with zero-day exploits!
http://www.securityfocus.com/bid/16556 SPIP is prone to a remote command-execution vulnerability. This is due to a lack of proper sanitization of user-supplied input. An attacker can exploit this issue to execute arbitrary remote PHP commands on an affected computer with the privileges of the webserver process. Successful exploitation could facilitate unauthorized access; other attacks are also possible. Version 1.8.2g and earlier are vulnerable; other versions may also be affected. CVE ID being requested. -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.15-1-686-smp Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

