[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2009/dsa-1954.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2009/dsa-1954.wml	2017-11-01 10:11:10.107830129 +0500
+++ russian/security/2009/dsa-1954.wml	2018-02-26 23:38:28.123499372 +0500
@@ -1,49 +1,50 @@
- -<define-tag description>insufficient input sanitising</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>недоÑ?Ñ?аÑ?оÑ?наÑ? оÑ?иÑ?Ñ?ка вÑ?однÑ?Ñ? даннÑ?Ñ?</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been found in cacti, a frontend to rrdtool
- -for monitoring systems and services. The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? cacti, полÑ?зоваÑ?елÑ?Ñ?ком инÑ?еÑ?Ñ?ейÑ?е длÑ? rrdtool длÑ? мониÑ?оÑ?инга Ñ?иÑ?Ñ?ем и Ñ?лÑ?жб,
+бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3112";>CVE-2007-3112</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2007-3113";>CVE-2007-3113</a>
 
- -<p>It was discovered that cacti is prone to a denial of service via the
- -graph_height, graph_width, graph_start and graph_end parameters.
- -This issue only affects the oldstable (etch) version of cacti.</p></li>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о cacti Ñ?Ñ?звим к оÑ?казÑ? в обÑ?лÑ?живании, коÑ?оÑ?ое можеÑ? бÑ?Ñ?Ñ? вÑ?звано
+Ñ?еÑ?ез паÑ?амеÑ?Ñ?Ñ? graph_height, graph_width, graph_start и graph_end.
+Ð?аннаÑ? пÑ?облема каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко веÑ?Ñ?ии cacti из пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка (etch).</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4032";>CVE-2009-4032</a>
 
- -<p>It was discovered that cacti is prone to several cross-site scripting
- -attacks via different vectors.</p></li>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о cacti Ñ?Ñ?звим к аÑ?акам по пÑ?инÑ?ипÑ? межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга Ñ?еÑ?ез
+Ñ?азлиÑ?нÑ?е векÑ?оÑ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4112";>CVE-2009-4112</a>
 
- -<p>It has been discovered that cacti allows authenticated administrator
- -users to gain access to the host system by executing arbitrary commands
- -via the "Data Input Method" for the "Linux - Get Memory Usage" setting.</p>
- -
- -<p>There is no fix for this issue at this stage. Upstream will implement a
- -whitelist policy to only allow certain "safe" commands. For the moment,
- -we recommend that such access is only given to trusted users and that
- -the options "Data Input" and "User Administration" are otherwise
- -deactivated.</p></li>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о cacti позволÑ?еÑ? аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованномÑ? админиÑ?Ñ?Ñ?аÑ?оÑ?ам
+полÑ?Ñ?аÑ?Ñ? доÑ?Ñ?Ñ?п к Ñ?иÑ?Ñ?еме Ñ?зла, вÑ?полнÑ?Ñ? пÑ?оизволÑ?нÑ?е командÑ?
+Ñ? помоÑ?Ñ?Ñ? "Data Input Method" длÑ? наÑ?Ñ?Ñ?ойки "Linux - Get Memory Usage".</p>
+
+<p>Ð?а даннÑ?й моменÑ? иÑ?пÑ?авлениÑ? данной пÑ?облемÑ? неÑ?. РазÑ?абоÑ?Ñ?ики оÑ?новной веÑ?ки
+планиÑ?Ñ?Ñ?Ñ? Ñ?еализоваÑ?Ñ? пÑ?авило Ñ?азÑ?еÑ?Ñ?нного Ñ?пиÑ?ка, Ñ?оглаÑ?но коÑ?оÑ?омÑ? бÑ?деÑ? Ñ?азÑ?еÑ?ено иÑ?полÑ?зование Ñ?олÑ?ко
+опÑ?еделÑ?ннÑ?Ñ? "безопаÑ?нÑ?Ñ?" команд. Ð? наÑ?Ñ?оÑ?Ñ?ее вÑ?емÑ? Ñ?екомендÑ?еÑ?Ñ?Ñ? пÑ?едоÑ?Ñ?авлÑ?Ñ?Ñ? Ñ?акой доÑ?Ñ?Ñ?п
+Ñ?олÑ?ко довеÑ?еннÑ?м полÑ?зоваÑ?елÑ?м, в пÑ?оÑ?ивном Ñ?лÑ?Ñ?ае опÑ?ии "Data Input" и "User Administration"
+Ñ?ледÑ?еÑ? оÑ?клÑ?Ñ?иÑ?Ñ?.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (etch), these problems have been fixed in
- -version 0.8.6i-3.6.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.8.6i-3.6.</p>
 
- -<p>For the stable distribution (lenny), this problem has been fixed in
- -version 0.8.7b-2.1+lenny1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 0.8.7b-2.1+lenny1.</p>
 
- -<p>For the testing distribution (squeeze), this problem will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 0.8.7e-1.1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 0.8.7e-1.1.</p>
 
 
- -<p>We recommend that you upgrade your cacti packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? cacti.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=cxPa
-----END PGP SIGNATURE-----


Reply to: