Home / vulnerabilities MDKSA-2006-234.txt
Posted on 22 December 2006
Source : packetstormsecurity.org Link
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2006:234
http://www.mandriva.com/security/
_______________________________________________________________________
Package : mono
Date : December 20, 2006
Affected: 2007.0
_______________________________________________________________________
Problem Description:
XSP (the Mono ASP.NET server) is vulnerable to source disclosure attack
which allow a malicious user to obtain the source code of the
server-side application. This vulnerability grants the attacker deeper
knowledge of the Web application logic.
Updated packages have been patched to correct this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6104
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2007.0:
372cd7944c4ae044529132a60a0f4cba 2007.0/i586/jay-1.1.17.1-5.2mdv2007.0.i586.rpm
57586c9c8baff2fbe3c59c3529adc5a7 2007.0/i586/libmono-runtime-1.1.17.1-5.2mdv2007.0.i586.rpm
1cf0dcab116f59634f3890fab1cb46eb 2007.0/i586/libmono0-1.1.17.1-5.2mdv2007.0.i586.rpm
1898e4fc4e6f1c671c37a8d76814a89f 2007.0/i586/libmono0-devel-1.1.17.1-5.2mdv2007.0.i586.rpm
7dca6df31b2cac25df9d1568136ab8b3 2007.0/i586/mono-1.1.17.1-5.2mdv2007.0.i586.rpm
cb7c8cd1f5db165f31ea7e139d60fc75 2007.0/i586/mono-data-sqlite-1.1.17.1-5.2mdv2007.0.i586.rpm
73cfb46d15b9b0588f4013781d40a114 2007.0/i586/mono-doc-1.1.17.1-5.2mdv2007.0.i586.rpm
ddc633435f442f9436caec01d9796830 2007.0/SRPMS/mono-1.1.17.1-5.2mdv2007.0.src.rpm
Mandriva Linux 2007.0/X86_64:
2b54bfd1164dd9c935b9af5c3297e90a 2007.0/x86_64/jay-1.1.17.1-5.2mdv2007.0.x86_64.rpm
6b137c021b3596699b22af6a8ef919fc 2007.0/x86_64/lib64mono0-1.1.17.1-5.2mdv2007.0.x86_64.rpm
8825990b27f3c66c2e225d483290b41d 2007.0/x86_64/lib64mono0-devel-1.1.17.1-5.2mdv2007.0.x86_64.rpm
a58792e500afc0a1f231a46ba7c8cf96 2007.0/x86_64/libmono-runtime-1.1.17.1-5.2mdv2007.0.x86_64.rpm
6030ac6e852551dea3f36dc2ab54ecb2 2007.0/x86_64/mono-1.1.17.1-5.2mdv2007.0.x86_64.rpm
baec0fa42850f91bb089317f62e5722c 2007.0/x86_64/mono-data-sqlite-1.1.17.1-5.2mdv2007.0.x86_64.rpm
72d633232728911fc9fa428ab3af582f 2007.0/x86_64/mono-doc-1.1.17.1-5.2mdv2007.0.x86_64.rpm
ddc633435f442f9436caec01d9796830 2007.0/SRPMS/mono-1.1.17.1-5.2mdv2007.0.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFFiX+7mqjQ0CJFipgRAoaWAKCaYYK+vmPWKIsmFyVX3VXw9fEw+gCePcyJ
X3utvyAnG5Kd3sKqxKy2y7Q=
=3vlL
-----END PGP SIGNATURE-----