|
Message-ID: <3978202.EgPzrIJlpi@devil>
Date: Fri, 14 Sep 2012 20:21:27 +0200
From: Agostino Sarubbo <ago@...too.org>
To: oss-security@...ts.openwall.com
Subject: CVE request: bacula: Console ACL Bypass
Hello,
>From secunia advisory https://secunia.com/advisories/50535/ :
The security issue is caused due to an error within the implementation of
console ACLs, which can be exploited to gain access to certain restricted
functionality and e.g. dump resources.
The security issue is reported in versions prior to 5.2.11.
Patch: http://sourceforge.net/projects/bacula/files/bacula/5.2.11/0001-Fix-
bug-1932-director-crash.patch
Can you assign a CVE for this issue?
--
Agostino Sarubbo / ago -at- gentoo.org
Gentoo/AMD64 Arch Security Liaison
GPG: 0x7CD2DC5D
Download attachment "signature.asc" of type "application/pgp-signature" (491 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.