Pardus Linux Security Advisory - Juraj Skripsky has reported a vulnerability in Mono, which can be exploited by malicious people to conduct HTTP header injection attacks.
a110dc1f502aff35301058c2b04af09d0ba26ed433987154ac42c5cb4f2b88fa
------------------------------------------------------------------------
Pardus Linux Security Advisory 2008-32 security@pardus.org.tr
------------------------------------------------------------------------
Date: 2008-08-31
Severity: 2
Type: Remote
------------------------------------------------------------------------
Summary
=======
Juraj Skripsky has reported a vulnerability in Mono, which can be
exploited by malicious people to conduct HTTP header injection attacks.
Description
===========
The vulnerability is caused due to the Sys.Web module not properly
sanitising certain parameters before using them in HTTP responses. This
can be exploited to inject arbitrary HTML and script code, which is
executed in a user's browser session in context of an affected site.
Affected packages:
Pardus 2008:
mono, all before 1.2.6-17-2
Resolution
==========
There are update(s) for mono. You can update them via Package Manager or
with a single command from console:
pisi up mono
References
==========
* http://bugs.pardus.org.tr/show_bug.cgi?id=8069
* https://bugzilla.novell.com/show_bug.cgi?id=418620
* http://secunia.com/advisories/31643/
------------------------------------------------------------------------
--
Pınar Yanardağ
Pardus Security Team
http://security.pardus.org.tr