[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2005/dsa-8{38,05}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2005/dsa-805.wml	2005-09-09 15:14:14.000000000 +0600
+++ russian/security/2005/dsa-805.wml	2016-10-13 19:19:46.344105197 +0500
@@ -1,49 +1,50 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several problems have been discovered in Apache2, the next generation,
- -scalable, extendable web server.  The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? Apache2, маÑ?Ñ?Ñ?абиÑ?Ñ?емом Ñ?аÑ?Ñ?иÑ?Ñ?емом веб-Ñ?еÑ?веÑ? Ñ?ледÑ?Ñ?Ñ?его поколениÑ?,
+бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко пÑ?облем.  Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1268";>CAN-2005-1268</a>
 
- -    <p>Marc Stern discovered an off-by-one error in the mod_ssl
- -    Certificate Revocation List (CRL) verification callback.  When
- -    Apache is configured to use a CRL this can be used to cause a
- -    denial of service.</p>
+    <p>Ð?аÑ?к ШÑ?еÑ?н обнаÑ?Ñ?жил оÑ?ибкÑ? на единиÑ?Ñ? в обÑ?аÑ?ном вÑ?зове пÑ?овеÑ?ки the mod_ssl
+    Certificate Revocation List (CRL).  Ð?Ñ?ли Apache наÑ?Ñ?Ñ?оен
+    на иÑ?полÑ?зование CRL, Ñ?о Ñ?Ñ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? можеÑ? вÑ?зÑ?ваÑ?Ñ?
+    оÑ?каз в обÑ?лÑ?живании.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2088";>CAN-2005-2088</a>
 
- -    <p>A vulnerability has been discovered in the Apache web server.
- -    When it is acting as an HTTP proxy, it allows remote attackers to
- -    poison the web cache, bypass web application firewall protection,
- -    and conduct cross-site scripting attacks, which causes Apache to
- -    incorrectly handle and forward the body of the request.</p>
+    <p>Ð? веб-Ñ?еÑ?веÑ?е Apache бÑ?ла обнаÑ?Ñ?жена Ñ?Ñ?звимоÑ?Ñ?Ñ?.
+    Ð?огда веб-Ñ?еÑ?веÑ? вÑ?полнÑ?еÑ? Ñ?олÑ? HTTP-пÑ?окÑ?и, он позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+    оÑ?Ñ?авлÑ?Ñ?Ñ? веб-кеÑ?, обÑ?одиÑ?Ñ? заÑ?иÑ?Ñ? пÑ?иложениÑ?,
+    а Ñ?акже вÑ?полнÑ?Ñ?Ñ? аÑ?аки по пÑ?инÑ?ипÑ? межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга, Ñ?Ñ?о пÑ?иводиÑ? к Ñ?омÑ?, Ñ?Ñ?о
+    Apache непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? и пеÑ?еÑ?Ñ?лаеÑ? Ñ?ело запÑ?оÑ?а.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2700";>CAN-2005-2700</a>
 
- -    <p>A problem has been discovered in mod_ssl, which provides strong
- -    cryptography (HTTPS support) for Apache that allows remote
- -    attackers to bypass access restrictions.</p>
+    <p>Ð?Ñ?ла обнаÑ?Ñ?жена пÑ?облема в модÑ?ле mod_ssl, пÑ?едоÑ?Ñ?авлÑ?Ñ?Ñ?ем Ñ?Ñ?ойкое
+    Ñ?иÑ?Ñ?ование (поддеÑ?жкÑ? HTTPS) длÑ? Apache, коÑ?оÑ?аÑ? позволÑ?еÑ? Ñ?далÑ?ннÑ?м
+    злоÑ?мÑ?Ñ?ленникам обÑ?одиÑ?Ñ? огÑ?аниÑ?ениÑ? доÑ?Ñ?Ñ?па.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2728";>CAN-2005-2728</a>
 
- -    <p>The byte-range filter in Apache 2.0 allows remote attackers to
- -    cause a denial of service via an HTTP header with a large Range
- -    field.</p>
+    <p>ФилÑ?Ñ?Ñ? байÑ?ового диапазона в Apache 2.0 позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+    вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании Ñ? помоÑ?Ñ?Ñ? заголовка HTTP Ñ? болÑ?Ñ?им
+    полем Range.</p>
 
 </ul>
 
- -<p>The old stable distribution (woody) does not contain Apache2 packages.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ?Ñ? Apache2 оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 2.0.54-5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.54-5.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.0.54-5.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.54-5.</p>
 
- -<p>We recommend that you upgrade your apache2 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? apache2.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-838.wml	2005-10-04 14:29:12.000000000 +0600
+++ russian/security/2005/dsa-838.wml	2016-10-13 19:13:12.284274660 +0500
@@ -1,53 +1,54 @@
- -<define-tag description>multiple vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Multiple security vulnerabilities have been identified in the
- -mozilla-firefox web browser. These vulnerabilities could allow an
- -attacker to execute code on the victim's machine via specially crafted
- -network resources.</p>
+<p>Ð? веб-бÑ?азÑ?еÑ?е mozilla-firefox бÑ?ли обнаÑ?Ñ?жен многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и,
+Ñ?вÑ?заннÑ?е Ñ? безопаÑ?ноÑ?Ñ?Ñ?Ñ?. ЭÑ?и Ñ?Ñ?звимоÑ?Ñ?и могÑ?Ñ? позволиÑ?Ñ?
+злоÑ?мÑ?Ñ?ленникÑ? вÑ?полниÑ?Ñ? код на маÑ?ине жеÑ?Ñ?вÑ? Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ?
+Ñ?еÑ?евÑ?Ñ? Ñ?еÑ?Ñ?Ñ?Ñ?ов.</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2701";>CAN-2005-2701</a>
 
- -	<p>Heap overrun in XBM image processing</p></li>
+	<p>Ð?еÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и пÑ?и обÑ?абоÑ?ке изобÑ?ажений в Ñ?оÑ?маÑ?е XBM</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2702";>CAN-2005-2702</a>
 
- -	<p>Denial of service (crash) and possible execution of arbitrary
- -	code via Unicode sequences with "zero-width non-joiner"
- -	characters.</p></li>
+	<p>Ð?Ñ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка) и возможное вÑ?полнение пÑ?оизволÑ?ного
+	кода Ñ? помоÑ?Ñ?Ñ? поÑ?ледоваÑ?елÑ?ноÑ?Ñ?ей Unicode-Ñ?имволов Ñ? Ñ?имволами
+        "zero-width non-joiner".</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2703";>CAN-2005-2703</a>
 
- -	<p>XMLHttpRequest header spoofing</p></li>
+	<p>Ð?одделка заголовка XMLHttpRequest</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2704";>CAN-2005-2704</a>
 
- -	<p>Object spoofing using XBL &lt;implements&gt;</p></li>
+	<p>Ð?одделка обÑ?екÑ?а Ñ? помоÑ?Ñ?Ñ? XBL &lt;implements&gt;</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2705";>CAN-2005-2705</a>
 
- -	<p>JavaScript integer overflow</p></li>
+	<p>Ð?еÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в JavaScript</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2706";>CAN-2005-2706</a>
 
- -	<p>Privilege escalation using about: scheme</p></li>
+	<p>Ð?овÑ?Ñ?ение пÑ?ивилегий Ñ? помоÑ?Ñ?Ñ? Ñ?Ñ?емÑ? about:</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2707";>CAN-2005-2707</a>
 
- -	<p>Chrome window spoofing allowing windows to be created without
- -	UI components such as a URL bar or status bar that could be
- -	used to carry out phishing attacks</p></li>
+	<p>Ð?одделка окна Chrome, позволÑ?Ñ?Ñ?аÑ? Ñ?оздаÑ?Ñ? окна без
+	компоненÑ?ов полÑ?зоваÑ?елÑ?Ñ?кого инÑ?еÑ?Ñ?ейÑ?а (Ñ?Ñ?Ñ?ока URL, Ñ?Ñ?аÑ?Ñ?Ñ?наÑ? Ñ?Ñ?Ñ?ока), Ñ?Ñ?о
+	можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? Ñ?иÑ?инг-аÑ?ак</p></li>
 
 </ul>
 
- -<p>For the stable distribution (sarge), these problems have been fixed in
- -version 1.0.4-2sarge5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.0.4-2sarge5.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 1.0.7-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.0.7-1.</p>
 
- -<p>We recommend that you upgrade your mozilla-firefox package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? mozilla-firefox.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=bvfu
-----END PGP SIGNATURE-----


Reply to: