lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 6 Mar 2015 13:43:29 -0800
From: <noreply-secresearch@...tinet.com>
To: <bugtraq@...urityfocus.com>, <disclosure@...ts.grok.org.uk>,
  <full-disclosure@...ts.grok.org.uk>
Subject: MongoDB BSON Handling Remote Denial of Service Vulnerability

MongoDB BSON Handling Remote Denial of Service Vulnerability
March 06, 2015

Summary:
========

Fortinet's FortiGuard Labs has discovered a remote denial of service
vulnerability in MongoDB. It allows remote attackers to launch a denial of
service attack without providing any authentication credentials.


Impact:
=======

Remote Denial Of Service


Risk:
=====

High


Affected Software:
==================

MongoDB 2.4.12
MongoDB 2.6.7
MongoDB 3.0.0-rc8 
 

Additional Information:
=======================

MongoDB fails to validate malformed BSON message. A specially crafted BSON
message may trigger an uncaught exception in the server, which can result in
a loss of availability. 


Solutions:
==========

Apply the solution provided by MongoDB Inc. See
https://jira.mongodb.org/browse/SERVER-17264.

FortiGuard Labs released the following signature which covers this specific
vulnerability:
MongoDB.BSON.Handling.Remote.DoS
 
 
Acknowledgement:
================

Xiaopeng Zhang of Fortinet's FortiGuard Labs.


References:
===========

http://www.fortiguard.com/advisory/FG-VD-15-012/
https://www.mongodb.org/about/alerts/
https://jira.mongodb.org/browse/SERVER-17264
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2015-1609


***  Please note that this message and any attachments may contain confidential 
and proprietary material and information and are intended only for the use of 
the intended recipient(s). If you are not the intended recipient, you are hereby 
notified that any review, use, disclosure, dissemination, distribution or copying 
of this message and any attachments is strictly prohibited. If you have received 
this email in error, please immediately notify the sender and destroy this e-mail 
and any attachments and all copies, whether electronic or printed.
Please also note that any views, opinions, conclusions or commitments expressed 
in this message are those of the individual sender and do not necessarily reflect 
the views of Fortinet, Inc., its affiliates, and emails are not binding on 
Fortinet and only a writing manually signed by Fortinet's General Counsel can be 
a binding commitment of Fortinet to Fortinet's customers or partners. Thank you. ***

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ