[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2006/dsa-1199.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2006/dsa-1199.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-1199.wml	2016-10-03 00:17:15.690943725 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>multiple vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been identified in webmin, a web-based
- -administration toolkit. The Common Vulnerabilities and Exposures project
- -identifies the following vulnerabilities:</p>
+<p>Ð? webmin, инÑ?Ñ?Ñ?Ñ?менÑ?е длÑ? админиÑ?Ñ?Ñ?иÑ?ованиÑ? Ñ?еÑ?ез веб, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие Ñ?Ñ?звимоÑ?Ñ?и:</p>
 
 <ul>
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-3912";>CVE-2005-3912</a>
- -	<p>A format string vulnerability in miniserv.pl could allow an
- -	attacker to cause a denial of service by crashing the
- -	application or exhausting system resources, and could
- -	potentially allow arbitrary code execution.</p></li>
+	<p>УÑ?звимоÑ?Ñ?Ñ? Ñ?оÑ?маÑ?ной Ñ?Ñ?Ñ?оки в miniserv.pl можеÑ? позволиÑ?Ñ?
+	злоÑ?мÑ?Ñ?ленникÑ? вÑ?зваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании из-за аваÑ?ийной оÑ?Ñ?ановки
+	пÑ?иложениÑ? или иÑ?Ñ?еÑ?паниÑ? Ñ?иÑ?Ñ?емнÑ?Ñ? Ñ?еÑ?Ñ?Ñ?Ñ?ов, а Ñ?акже можеÑ?
+	поÑ?енÑ?иалÑ?но позволиÑ?Ñ? вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-3392";>CVE-2006-3392</a>
- -	<p>Improper input sanitization in miniserv.pl could allow an
- -	attacker to read arbitrary files on the webmin host by providing
- -	a specially crafted URL path to the miniserv http server.</p></li>
+	<p>Ð?епÑ?авилÑ?наÑ? оÑ?иÑ?Ñ?ка вÑ?однÑ?Ñ? даннÑ?Ñ? в miniserv.pl можеÑ? позволиÑ?Ñ?
+	злоÑ?мÑ?Ñ?ленникÑ? Ñ?Ñ?иÑ?аÑ?Ñ? пÑ?оизволÑ?нÑ?е Ñ?айлÑ? на Ñ?зле webmin пÑ?Ñ?Ñ?м пеÑ?едаÑ?и
+	Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного URL http-Ñ?еÑ?веÑ?Ñ? miniserv.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4542";>CVE-2006-4542</a>
- -	<p>Improper handling of null characters in URLs in miniserv.pl
- -	could allow an attacker to conduct cross-site scripting attacks,
- -	read CGI program source code, list local directories, and
- -	potentially execute arbitrary code.</p></li>
+	<p>Ð?епÑ?авилÑ?наÑ? обÑ?абоÑ?ка null-Ñ?имволов в URL в miniserv.pl
+	можеÑ? позволиÑ?Ñ? злоÑ?мÑ?Ñ?ленникÑ? вÑ?полниÑ?Ñ? межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг,
+	Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ? иÑ?Ñ?однÑ? код CGI-пÑ?огÑ?аммÑ?, вÑ?водиÑ?Ñ? Ñ?пиÑ?ок Ñ?одеÑ?жимого локалÑ?нÑ?Ñ? каÑ?алогов, а
+	Ñ?акже поÑ?енÑ?иалÑ?но вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
 </ul>
 
- -<p>Stable updates are available for alpha, amd64, arm, hppa, i386, ia64,
- -m68k, mips, mipsel, powerpc, s390 and sparc.</p>
+<p>Ð?бновлениÑ? длÑ? Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка доÑ?Ñ?Ñ?пнÑ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ? alpha, amd64, arm, hppa, i386, ia64,
+m68k, mips, mipsel, powerpc, s390 и sparc.</p>
 
- -<p>For the stable distribution (sarge), these problems have been fixed in
- -version 1.180-3sarge1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.180-3sarge1.</p>
 
- -<p>Webmin is not included in unstable (sid) or testing (etch), so these
- -problems are not present.</p>
+<p>Webmin оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ? в неÑ?Ñ?абилÑ?ном (sid) и Ñ?еÑ?Ñ?иÑ?Ñ?емом (etch) вÑ?пÑ?Ñ?каÑ?, поÑ?Ñ?омÑ? в ниÑ?
+Ñ?казаннÑ?е пÑ?облемÑ? оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
 
- -<p>We recommend that you upgrade your webmin (1.180-3sarge1) package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? webmin (1.180-3sarge1).</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJX8V09AAoJEF7nbuICFtKlnEkP/A9CsL27g/xatf0M6933i/pd
q8HjD51Lr2MrcH+2J24AI3XGiiaRf6pJ5jwr7muBcZvsmZmYiqN5PL0OanCAfc/t
+pXH586sTNyql33rGnhXEUGVZxxd1QAaaurUyQV8IelAUciWzDI931rNM2zuZIov
OxWXZ/eT9ap3V10ijwRxBOt1faA6SW1gdXbi+pBf4TxDoldpmmfd/xvXdG2mlm//
jP8vhmeU+L6WsmeiAGRPsh0bxBpjUBTgiePqYSg3MraS18vZqn2tGEM8kfzQp4bb
weP5bUTl7bcvEiYpOjNQxlXFOvi1u6iceZ5SkydXHJ3ckPX3wnV0l2TLV+ZnZGN2
YQLqyXsFhfu6RNGQfW0oNW2rVijxsrCHTtfq6rK3s3BsjbF5oEg4DjCYp5g+hozo
qVQrswqVlPqPdRXiYF4KiRIBKsj90d2qJLgHFOzXF6AWJyKUSOiFo9N0sAbMoCug
d/3e9XDCj37NFqY/8rsmFtAdFGMJoeZ5yaI9u7i7L07GgPLFmbmYBrVvoHfRARt9
VuLkB4cSrSObwrmcKLyyh0n3oSaZRwF+ZDA8Ofo3OGMRvKNP7YCvBPb+kRB2hljf
X8v98IDgMGPPXzVwXe7IvK+PQswgEvQ/YWvfhn0sKndQ2sedGayVRt4BDtwyWEaa
zu9SHICv0yRn2ra9ywtW
=sZXU
-----END PGP SIGNATURE-----


Reply to: