Bug 85071 - [PATCH] www/awstats: Fix remote exploitation vulnerability
Summary: [PATCH] www/awstats: Fix remote exploitation vulnerability
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: Normal Affects Only Me
Assignee: Simon L. B. Nielsen
Depends on:
Reported: 2005-08-18 06:40 UTC by Toni Viemero
Modified: 2005-08-23 21:29 UTC (History)
1 user (show)

See Also:

awstats-6.4_1.patch (12.55 KB, patch)
2005-08-18 06:40 UTC, Toni Viemero
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Toni Viemero 2005-08-18 06:40:11 UTC
- Fix remote exploitation vulnerability described in:
- Patch taken from awstats CVS ( http://tinyurl.com/duy6o )

Added file(s):
- files/patch-awstats.pl

Port maintainer (webmaster@lightningfire.net) is cc'd.

Generated with FreeBSD Port Tools 0.63
Comment 1 Pav Lucistnik freebsd_committer 2005-08-18 17:02:43 UTC
Dear maintainer of FreeBSD port www/awstats, please take a look at


Do you approve this update?

Pav Lucistnik <pav@oook.cz>

With sufficient thrust, pigs fly just fine.
  -- RFC 1925
Comment 2 Pav Lucistnik freebsd_committer 2005-08-18 17:02:46 UTC
State Changed
From-To: open->feedback

Asked maintainer for approval 

Comment 3 Pav Lucistnik freebsd_committer 2005-08-18 17:02:46 UTC
Responsible Changed
From-To: freebsd-ports-bugs->pav

Comment 4 Pav Lucistnik freebsd_committer 2005-08-23 13:26:48 UTC
Responsible Changed
From-To: pav->simon

Simon offered to handle this with his secteam hat on
Comment 5 Simon L. B. Nielsen freebsd_committer 2005-08-23 21:28:47 UTC
State Changed
From-To: feedback->closed

Committed, thanks for the submission!