lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1XrUiB-000630-7S@master.debian.org>
Date: Thu, 20 Nov 2014 16:36:03 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3075-1] drupal7 security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3075-1                   security@...ian.org
http://www.debian.org/security/                      Salvatore Bonaccorso
November 20, 2014                      http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : drupal7
CVE ID         : CVE-2014-9015 CVE-2014-9016

Two vulnerabilities were discovered in Drupal, a fully-featured content
management framework. The Common Vulnerabilities and Exposures project
identifies the following issues:

CVE-2014-9015

    Aaron Averill discovered that a specially crafted request can give a
    user access to another user's session, allowing an attacker to
    hijack a random session.

CVE-2014-9016

    Michael Cullum, Javier Nieto and Andres Rojas Guerrero discovered
    that the password hashing API allows an attacker to send
    specially crafted requests resulting in CPU and memory
    exhaustion. This may lead to the site becoming unavailable or
    unresponsive (denial of service).

Custom configured session.inc and password.inc need to be audited as
well to verify if they are prone to these vulnerabilities. More
information can be found in the upstream advisory at
https://www.drupal.org/SA-CORE-2014-006

For the stable distribution (wheezy), these problems have been fixed in
version 7.14-2+deb7u8.

We recommend that you upgrade your drupal7 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=kSed
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ