Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2017.2996 Cacti vulnerabilities patched in SUSE 23 November 2017 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: cacti cacti-spine Publisher: SUSE Operating System: SUSE UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Cross-site Scripting -- Remote with User Interaction Read-only Data Access -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2017-16785 CVE-2017-16661 CVE-2017-16660 CVE-2017-16641 Original Bulletin: https://www.suse.com/support/update/announcement/2017/suse-su-20173051-1 Comment: This advisory references vulnerabilities in products which run on platforms other than SUSE. It is recommended that administrators running cacti or cacti-spine check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- openSUSE Security Update: Security update for cacti, cacti-spine ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:3051-1 Rating: important References: #1067163 #1067164 #1067166 #1068028 Cross-References: CVE-2017-16641 CVE-2017-16660 CVE-2017-16661 CVE-2017-16785 Affected Products: openSUSE Leap 42.3 openSUSE Leap 42.2 ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. Description: This update for cacti, cacti-spine to version 1.1.28 fixes the following issues: - CVE-2017-16641: Potential code execution vulnerability in RRDtool functions (boo#1067166) - CVE-2017-16660: Remote execution vulnerability in logging function (boo#1067164) - CVE-2017-16661: Arbitrary file read vulnerability in view log file (boo#1067163) - CVE-2017-16785: Reflection XSS vulnerability (boo#1068028) This update to version 1.1.28 also contains a number of upstream bug fixes and improvements. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2017-1290=1 - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-1290=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.3 (i586 x86_64): cacti-spine-1.1.28-20.1 cacti-spine-debuginfo-1.1.28-20.1 cacti-spine-debugsource-1.1.28-20.1 - openSUSE Leap 42.3 (noarch): cacti-1.1.28-29.1 cacti-doc-1.1.28-29.1 - openSUSE Leap 42.2 (i586 x86_64): cacti-spine-1.1.28-7.13.1 cacti-spine-debuginfo-1.1.28-7.13.1 cacti-spine-debugsource-1.1.28-7.13.1 - openSUSE Leap 42.2 (noarch): cacti-1.1.28-16.13.1 cacti-doc-1.1.28-16.13.1 References: https://www.suse.com/security/cve/CVE-2017-16641.html https://www.suse.com/security/cve/CVE-2017-16660.html https://www.suse.com/security/cve/CVE-2017-16661.html https://www.suse.com/security/cve/CVE-2017-16785.html https://bugzilla.suse.com/1067163 https://bugzilla.suse.com/1067164 https://bugzilla.suse.com/1067166 https://bugzilla.suse.com/1068028 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWhZaT4x+lLeg9Ub1AQgSDQ//UQkoOENEUl4JWuBZwCoc+zWq30iUMrAN kq5qKvOQz5eXajIGWQh690TpWpEYHLiQg2hE4Ybbrm8sk2a+XPSTqgO0nBMSzawo MjUiWtSbivc08My7SZz22jP0rUGX9VBvLpmY5AHr6OelbhMwWiIC3NwNn3hIh+WG qOdyZV12HJixr0TX1u0PjXIDzZd4fpDZ6O5R4vsPbxG0u/Fvrj16wn6Zv6e4KjTs vmKEh7+vsZthiHsoDF7s0Vt0UUysPwyYL2vqnhnoN62WCKf2brGVgrybFJCQFQhY Qe4qtAv+J7T5UVmA6b5PL8HFBLWVu/opvwMpMaz+l3KHZ+xj47VR/kygc5+MGxql APJkwCHOVrw29lhYmcYCUntbfKi6hEu3s8T06zZyBRUNoLKOxScl+ZyZ+vVRglZH 30QVB42/zSmVojyPkZqLUWmU90S2tac6TdSBan9PvHsuxn58XGXoO885TPaVemVq v0nlLdl/cOrEcvkQSEAkRacLD4wh0KOOAoZPsCF5xpOnbRkDy9tYwso5tIBpbHGH FJDkHVrH3ck3o9JOBjkbs1GVi9JaA/bI2r7zjQ2nzwXnimC1w+TrMoZqVR+I6VDv FkMHM4JuXVA0iLMxhj7+wCnpg4B2poU+q9ntwC0eGPRVdzT0CJLCH/Lva6sDTrY8 58pxSlr2hpo= =Rzno -----END PGP SIGNATURE-----