[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2010/dsa-1966.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2010/dsa-1966.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-1966.wml	2016-09-25 23:45:14.001040688 +0500
@@ -1,43 +1,44 @@
- -<define-tag description>insufficient input sanitising</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>недоÑ?Ñ?аÑ?оÑ?наÑ? оÑ?иÑ?Ñ?ка вÑ?однÑ?Ñ? даннÑ?Ñ?</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been found in horde3, the horde web application
- -framework. The Common Vulnerabilities and Exposures project identifies
- -the following problems:</p>
+<p>Ð? horde3, инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?е веб-пÑ?иложений horde, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3237";>CVE-2009-3237</a>
 
- -<p>It has been discovered that horde3 is prone to cross-site scripting
- -attacks via crafted number preferences or inline MIME text parts when
- -using text/plain as MIME type.
- -For lenny this issue was already fixed, but as an additional security
- -precaution, the display of inline text was disabled in the configuration
- -file.</p></li>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?а horde3 Ñ?Ñ?звима к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ?
+Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? наÑ?Ñ?Ñ?оек Ñ?иÑ?ел или вÑ?Ñ?Ñ?оеннÑ?Ñ? Ñ?екÑ?Ñ?овÑ?Ñ? Ñ?аÑ?Ñ?ей MIME в
+Ñ?лÑ?Ñ?ае иÑ?полÑ?зованиÑ? text/plain в каÑ?еÑ?Ñ?ве Ñ?ипа MIME.
+Ð? lenny Ñ?Ñ?а пÑ?облема Ñ?же бÑ?ла иÑ?пÑ?авлена, но в каÑ?еÑ?Ñ?ве дополниÑ?елÑ?ной пÑ?едоÑ?Ñ?оÑ?ожноÑ?Ñ?и
+в Ñ?айле наÑ?Ñ?Ñ?оек бÑ?ло оÑ?клÑ?Ñ?ено оÑ?обÑ?ажение вÑ?Ñ?Ñ?оенного
+Ñ?екÑ?Ñ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3701";>CVE-2009-3701</a>
 
- -<p>It has been discovered that the horde3 administration interface is prone
- -to cross-site scripting attacks due to the use of the PHP_SELF variable.
- -This issue can only be exploited by authenticated administrators.</p></li>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о инÑ?еÑ?Ñ?ейÑ? админиÑ?Ñ?Ñ?аÑ?оÑ?а horde3 Ñ?Ñ?звим к
+межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ? из-за иÑ?полÑ?зованиÑ? пеÑ?еменной PHP_SELF.
+ЭÑ?а пÑ?облема можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? Ñ?олÑ?ко аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?ми админиÑ?Ñ?Ñ?аÑ?оÑ?ами.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4363";>CVE-2009-4363</a>
 
- -<p>It has been discovered that horde3 is prone to several cross-site
- -scripting attacks via crafted data:text/html values in HTML messages.</p></li>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?а horde3 Ñ?Ñ?звима к неÑ?колÑ?ким Ñ?лÑ?Ñ?аÑ?м межÑ?айÑ?ового
+Ñ?кÑ?ипÑ?инга Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? знаÑ?ений data:text/html в Ñ?ообÑ?ениÑ?Ñ? HTML.</p></li>
 </ul>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 3.2.2+debian0-2+lenny2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.2.2+debian0-2+lenny2.</p>
 
- -<p>For the oldstable distribution (etch), these problems have been fixed in
- -version 3.1.3-4etch7.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.1.3-4etch7.</p>
 
- -<p>For the testing distribution (squeeze) and the unstable distribution
- -(sid), these problems have been fixed in version 3.3.6+debian0-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 3.3.6+debian0-1.</p>
 
 
- -<p>We recommend that you upgrade your horde3 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? horde3.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=VJBY
-----END PGP SIGNATURE-----


Reply to: