Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4BB47F4D.2000309@redhat.com>
Date: Thu, 01 Apr 2010 13:11:09 +0200
From: Jan Lieskovsky <jlieskov@...hat.com>
To: "Steven M. Christey" <coley@...us.mitre.org>
CC: oss-security <oss-security@...ts.openwall.com>,
        oss-security <oss-security@...ts.openwall.com>
Subject: CVE Request -- Zabbix v1.8.2 and v.1.6.9

Hi Steve, vendors,

   though April the First today, this doesn't seem to be a joke:

   a, Zabbix <= 1.8.1 SQL Injection

   [1] http://seclists.org/fulldisclosure/2010/Apr/1
   [2] http://www.zabbix.com/rn1.8.2.php

   b, also on 25 March 2010, Zabbix v1.6.9 was
      released:

   [3] http://www.zabbix.com/rn1.6.9.php

      fixing one security issue -- remote commands execution in Zabbix Server.

   [4] https://support.zabbix.com/browse/ZBX-1030

Could you allocate CVE ids for these two issues?

Thanks && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team



Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.