[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2011/dsa-2{333,291}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2011/dsa-2291.wml	2014-04-30 13:16:25.000000000 +0600
+++ russian/security/2011/dsa-2291.wml	2016-10-02 02:03:40.427639432 +0500
@@ -1,43 +1,44 @@
- -<define-tag description>various vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>Ñ?азлиÑ?нÑ?е Ñ?Ñ?звимоÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
 
- -<p>Various vulnerabilities have been found in SquirrelMail, a webmail
- -application. The Common Vulnerabilities and Exposures project
- -identifies the following vulnerabilities:</p>
+<p>Ð? SquirrelMail, веб-поÑ?Ñ?е, бÑ?ли обнаÑ?Ñ?женÑ? Ñ?азлиÑ?нÑ?е
+Ñ?Ñ?звимоÑ?Ñ?и. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие Ñ?Ñ?звимоÑ?Ñ?и:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-4554";>CVE-2010-4554</a>
 
- -  <p>SquirrelMail did not prevent page rendering inside a third-party
- -  HTML frame, which makes it easier for remote attackers to conduct
- -  clickjacking attacks via a crafted web site.</p></li>
+  <p>SquirrelMail не пÑ?едоÑ?вÑ?аÑ?аеÑ? оÑ?Ñ?иÑ?овкÑ? Ñ?Ñ?Ñ?аниÑ?Ñ? во HTML-Ñ?Ñ?ейме Ñ?Ñ?еÑ?Ñ?ей Ñ?Ñ?оÑ?онÑ?,
+  Ñ?Ñ?о Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного веб-Ñ?айÑ?а облегÑ?аеÑ? Ñ?далÑ?ннÑ?м
+  злоÑ?мÑ?Ñ?ленникам вÑ?полнение кликджекинга.</p></li>
 
- -<li><a href="https://security-tracker.debian.org/tracker/CVE-2010-4555";>CVE-2010-4555</a>, 
- -    <a href="https://security-tracker.debian.org/tracker/CVE-2011-2752";>CVE-2011-2752</a>, 
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2010-4555";>CVE-2010-4555</a>,
+    <a href="https://security-tracker.debian.org/tracker/CVE-2011-2752";>CVE-2011-2752</a>,
     <a href="https://security-tracker.debian.org/tracker/CVE-2011-2753";>CVE-2011-2753</a>
 
- -  <p>Multiple small bugs in SquirrelMail allowed an attacker to inject
- -  malicious script into various pages or alter the contents of user
- -  preferences.</p></li>
+  <p>Ð?ногоÑ?иÑ?леннÑ?е неболÑ?Ñ?ие оÑ?ибки в SquirrelMail позволÑ?Ñ?Ñ? злоÑ?мÑ?Ñ?ленникÑ? вводиÑ?Ñ?
+  вÑ?едоноÑ?нÑ?й Ñ?Ñ?енаÑ?ий в Ñ?азлиÑ?нÑ?е Ñ?Ñ?Ñ?аниÑ?Ñ? или изменÑ?Ñ?Ñ? Ñ?одеÑ?жимое полÑ?зоваÑ?елÑ?Ñ?киÑ?
+  наÑ?Ñ?Ñ?оек.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2023";>CVE-2011-2023</a>
 
- -  <p>It was possible to inject arbitrary web script or HTML via a
- -  crafted STYLE element in an HTML part of an e-mail message.</p></li>
+  <p>Ð?ожно вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML Ñ? помоÑ?Ñ?Ñ?
+  Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?леменÑ?а STYLE в HTML коде Ñ?ообÑ?ений Ñ?лекÑ?Ñ?онной поÑ?Ñ?Ñ?.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (lenny), these problems have been fixed in
- -version 1.4.15-4+lenny5.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.4.15-4+lenny5.</p>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed in
- -version 1.4.21-2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.4.21-2.</p>
 
- -<p>For the testing (wheezy) and unstable distribution (sid), these problems
- -have been fixed in version 1.4.22-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?и пÑ?облемÑ?
+бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1.4.22-1.</p>
 
- -<p>We recommend that you upgrade your squirrelmail packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? squirrelmail.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2011/dsa-2333.wml	2014-04-30 13:16:25.000000000 +0600
+++ russian/security/2011/dsa-2333.wml	2016-10-02 01:58:39.642934405 +0500
@@ -1,40 +1,41 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Two vulnerabilities have been discovered in phpLDAPadmin, a web based
- -interface for administering LDAP servers. The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? phpLDAPadmin, веб-инÑ?еÑ?Ñ?ейÑ?е длÑ? админиÑ?Ñ?Ñ?иÑ?ованиÑ? LDAP-Ñ?еÑ?веÑ?ов, бÑ?ли
+обнаÑ?Ñ?женÑ? две Ñ?Ñ?звимоÑ?Ñ?и. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-4074";>CVE-2011-4074</a>
 
- -  <p>Input appended to the URL in cmd.php (when <q>cmd</q> is set to <q>_debug</q>) is
- -  not properly sanitised before being returned to the user. This can be
- -  exploited to execute arbitrary HTML and script code in a user's browser
- -  session in context of an affected site.</p></li>
+  <p>Ð?Ñ?однÑ?е даннÑ?е, добавлÑ?емÑ?е к URL в cmd.php (когда <q>cmd</q> имееÑ? знаÑ?ение <q>_debug</q>),
+  оÑ?иÑ?аÑ?Ñ?Ñ?Ñ? непÑ?авилÑ?но до иÑ? возвÑ?аÑ?а полÑ?зоваÑ?елÑ?. ЭÑ?о можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ?
+  длÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода HTML или Ñ?Ñ?енаÑ?иÑ? в бÑ?аÑ?зеÑ?е полÑ?зоваÑ?елÑ?
+  в конÑ?екÑ?Ñ?е подвеÑ?женного Ñ?Ñ?звимоÑ?Ñ?и Ñ?айÑ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-4075";>CVE-2011-4075</a>
 
- -  <p>Input passed to the <q>orderby</q> parameter in cmd.php (when <q>cmd</q> is set to
- -  <q>query_engine</q>, <q>query</q> is set to <q>none</q>, and <q>search</q> is set to e.g.
- -  <q>1</q>) is not properly sanitised in lib/functions.php before being used in a
- -  <q>create_function()</q> function call. This can be exploited to inject and
- -  execute arbitrary PHP code.</p></li>
+  <p>Ð?Ñ?однÑ?е даннÑ?е, пеÑ?едаваемÑ?е паÑ?амеÑ?Ñ?Ñ? <q>orderby</q> в cmd.php (когда <q>cmd</q> имееÑ? знаÑ?ение
+  <q>query_engine</q>, <q>query</q> имееÑ? знаÑ?ение <q>none</q>, а <q>search</q> имееÑ? знаÑ?ение, напÑ?имеÑ?,
+  <q>1</q>), непÑ?авилÑ?но оÑ?иÑ?аÑ?Ñ?Ñ?Ñ? в lib/functions.php до иÑ? иÑ?полÑ?зованиÑ? в
+  вÑ?зове Ñ?Ñ?нкÑ?ии <q>create_function()</q>. ЭÑ?о можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? введениÑ? и
+  вÑ?полнениÑ? пÑ?оизволÑ?ного кода на Ñ?зÑ?ке PHP.</p></li>
 
- -</ul> 
+</ul>
 
- -<p>For the oldstable distribution (lenny), these problems have been fixed in
- -version 1.1.0.5-6+lenny2.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.1.0.5-6+lenny2.</p>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed in
- -version 1.2.0.5-2+squeeze1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.2.0.5-2+squeeze1.</p>
 
- -<p>For the testing distribution (wheezy), these problems will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 1.2.0.5-2.1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.2.0.5-2.1.</p>
 
- -<p>We recommend that you upgrade your phpldapadmin packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? phpldapadmin.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=49NK
-----END PGP SIGNATURE-----


Reply to: