Lucene search

K
debianDebianDEBIAN:DSA-5298-1:C1F4D
HistoryDec 09, 2022 - 7:25 p.m.

[SECURITY] [DSA 5298-1] cacti security update

2022-12-0919:25:47
lists.debian.org
17
cacti
web interface
security update
cve-2022-0730
cve-2022-46169
command injection
ldap authentication
debian
bullseye
upgrade
security tracker
debian security advisory

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

AI Score

Confidence

High

0.964 High

EPSS

Percentile

99.6%


Debian Security Advisory DSA-5298-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
December 09, 2022 https://www.debian.org/security/faq


Package : cacti
CVE ID : CVE-2022-0730 CVE-2022-46169
Debian Bug : 1008693 1025648

Two security vulnerabilities have been discovered in Cacti, a web
interface for graphing of monitoring systems, which could result in
unauthenticated command injection or LDAP authentication bypass.

For the stable distribution (bullseye), these problems have been fixed in
version 1.2.16+ds1-2+deb11u1.

We recommend that you upgrade your cacti packages.

For the detailed security status of cacti please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/cacti

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

OSVersionArchitecturePackageVersionFilename
Debian11allcacti< 1.2.16+ds1-2+deb11u1cacti_1.2.16+ds1-2+deb11u1_all.deb
Debian10allcacti< 1.2.2+ds1-2+deb10u5cacti_1.2.2+ds1-2+deb10u5_all.deb

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

AI Score

Confidence

High

0.964 High

EPSS

Percentile

99.6%