[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2006/dsa-9{73,99}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2006/dsa-973.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-973.wml	2016-09-09 22:47:52.216171375 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in otrs, the Open Ticket
- -Request System, that can be exploited remotely.  The Common
- -Vulnerabilities and Exposures Project identifies the following
- -problems:</p>
+<p>Ð? otrs, Open Ticket Request System, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? Ñ?далÑ?нно.  Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-3893";>CVE-2005-3893</a>
 
- -    <p>Multiple SQL injection vulnerabilities allow remote attackers to
- -    execute arbitrary SQL commands and bypass authentication.</p></li>
+    <p>Ð?ногоÑ?иÑ?леннÑ?е Ñ?лÑ?Ñ?аи SQL-инÑ?екÑ?ий позволÑ?Ñ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+    вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?е SQL-командÑ? и обÑ?одиÑ?Ñ? аÑ?Ñ?енÑ?иÑ?икаÑ?иÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-3894";>CVE-2005-3894</a>
 
- -    <p>Multiple cross-site scripting vulnerabilities allow remote
- -    authenticated users to inject arbitrary web script or HTML.</p></li>
+    <p>Ð?ногоÑ?иÑ?леннÑ?е Ñ?лÑ?Ñ?аи межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга позволÑ?Ñ?Ñ? Ñ?далÑ?ннÑ?м
+    аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?м полÑ?зоваÑ?елÑ?м вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-3895";>CVE-2005-3895</a>
 
- -    <p>Internally attached text/html mails are rendered as HTML when the
- -    queue moderator attempts to download the attachment, which allows
- -    remote attackers to execute arbitrary web script or HTML.</p></li>
+    <p>Ð?ложеннÑ?е Ñ?ообÑ?ениÑ? Ñ?лекÑ?Ñ?онной поÑ?Ñ?Ñ? в Ñ?оÑ?маÑ?е text/html оÑ?Ñ?иÑ?овÑ?ваÑ?Ñ?Ñ?Ñ? как HTML в Ñ?лÑ?Ñ?ае,
+    еÑ?ли модеÑ?аÑ?оÑ? оÑ?еÑ?еди делаеÑ? попÑ?Ñ?кÑ? загÑ?Ñ?зиÑ?Ñ? вложение, Ñ?Ñ?о позволÑ?еÑ?
+    Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML.</p></li>
 
 </ul>
 
- -<p>The old stable distribution (woody) does not contain OTRS packages.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ?Ñ? OTRS оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 1.3.2p01-6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.2p01-6.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.0.4p01-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.4p01-1.</p>
 
- -<p>We recommend that you upgrade your otrs package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? otrs.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-999.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-999.wml	2016-09-09 22:54:30.164468699 +0500
@@ -1,40 +1,41 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several security related problems have been discovered in lurker, an
- -archive tool for mailing lists with integrated search engine.  The
- -Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? lurker, инÑ?Ñ?Ñ?Ñ?менÑ?е аÑ?Ñ?ивиÑ?ованиÑ? длÑ? Ñ?пиÑ?ков Ñ?аÑ?Ñ?Ñ?лки Ñ?о вÑ?Ñ?Ñ?оеннÑ?м движком
+поиÑ?ка, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?вÑ?заннÑ?Ñ? Ñ? безопаÑ?ноÑ?Ñ?Ñ?Ñ? пÑ?облем.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1062";>CVE-2006-1062</a>
 
- -    <p>Lurker's mechanism for specifying configuration files was
- -    vulnerable to being overridden.  As lurker includes sections of
- -    unparsed config files in its output, an attacker could manipulate
- -    lurker into reading any file readable by the www-data user.</p></li>
+    <p>Ð?еÑ?анизм lurker длÑ? опÑ?еделениÑ? Ñ?айлов наÑ?Ñ?Ñ?оек
+    Ñ?Ñ?звим к пеÑ?еопÑ?еделениÑ?.  Ð?оÑ?колÑ?кÑ? lurker вклÑ?Ñ?аеÑ? в вÑ?вод Ñ?азделÑ?
+    неÑ?азобÑ?аннÑ?Ñ? Ñ?айлов наÑ?Ñ?Ñ?оек, поÑ?Ñ?олÑ?кÑ? злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ?
+    lurker длÑ? Ñ?Ñ?ениÑ? лÑ?бого Ñ?айла, оÑ?кÑ?Ñ?Ñ?ого длÑ? Ñ?Ñ?ениÑ? полÑ?зоваÑ?елÑ? www-data.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1063";>CVE-2006-1063</a>
 
- -    <p>It is possible for a remote attacker to create or overwrite files
- -    in any writable directory that is named "mbox".</p></li>
+    <p>УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? Ñ?оздаваÑ?Ñ? или пеÑ?езапиÑ?Ñ?ваÑ?Ñ? Ñ?айлÑ?
+    в лÑ?бом каÑ?алоге, оÑ?кÑ?Ñ?Ñ?ом длÑ? запиÑ?и и имеÑ?Ñ?им имÑ? "mbox".</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1064";>CVE-2006-1064</a>
 
- -    <p>Missing input sanitising allows an attacker to inject arbitrary
- -    web script or HTML.</p></li>
+    <p>Ð?Ñ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникÑ? вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й
+    веб-Ñ?Ñ?енаÑ?ий или код HTML.</p></li>
 
 </ul>
 
- -<p>The old stable distribution (woody) does not contain lurker packages.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ?Ñ? lurker оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 1.2-5sarge1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.2-5sarge1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.1-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.1-1.</p>
 
- -<p>We recommend that you upgrade your lurker package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? lurker.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJX0vdYAAoJEF7nbuICFtKlhbYQAI2Ik1ad3P66IYcEBZ2K9M8u
cYsoTtMT1oIWZDQde8nD0QcBhOIzYTDKD47bcOexxQtLzNa2Le17i9Hn+rmWh4Lc
nAiQfLomhFfZ0bAi23CpvIIJAmLUiIcO3ay5p26COmIf+ra7S74msW0oVgh4f6Xw
amffqeBiZq199TYFtVRkcgEoATRsCcZmDYw1JttXaQyQPbPL5tZzYxbrvzurqic8
3XfVU3oxC6iRPDp2AWuECSFFnYPOjEV1LCX/vyievNhw1C9uGDLl7uyL74v0UT7b
r/nnW48bPBtuoi090JMSNBIuoet8oZhQeUKZk0w/6vFbMr/ymib5mHjQTSmuHcA7
HztAwB/G2f8fI5dedtxKl/gTvw8GkisnFFWzYTctLKdYkxuEtvW6f4RRhRAkyfjV
KCMlh8JlKO5+lRC3E3y4v5CBS53xQHPcTPHEeIx87QHJpELqBJ9TJaZB+/B6X8ju
N14N52Jmkz4O9fjNLyUGc62bo1b1dOmvKlv5oM71xAhp7T2rvbUrw3hFjvgv+jX+
u9KU88HS5i8jUqTuPX6UaugZ0jT/SScrlH+BxniuV59dlYwGpTUS8Pn7V94BqSs+
oRy5sqPziefOyyFFfHtRgLU+fXv9n6O/3apP+AuNS7iGK8RmlXDXAl3s+VIiNFoT
Nd5K1MxPOIKUWcxPKWho
=GVBh
-----END PGP SIGNATURE-----


Reply to: