From b7f95c1fd9db2d142abc6fe1ed83232b5d0c97df Mon Sep 17 00:00:00 2001 From: Neil McGovern Date: Mon, 12 Feb 2007 21:17:29 +0000 Subject: Release wordpress/DTSA-33-1 git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@5445 e39458fd-73e7-0310-bf30-c45bca0a0e42 --- website/DTSA/DTSA-33-1.html | 110 ++++++++++++++++++++++++++++++++++++++++++++ website/list.html | 2 + 2 files changed, 112 insertions(+) create mode 100644 website/DTSA/DTSA-33-1.html (limited to 'website') diff --git a/website/DTSA/DTSA-33-1.html b/website/DTSA/DTSA-33-1.html new file mode 100644 index 0000000000..9d44770cd4 --- /dev/null +++ b/website/DTSA/DTSA-33-1.html @@ -0,0 +1,110 @@ + + + Debian testing security team - Advisory + + + + +
+ + + + + Debian Project +
+
+ + + + + + + + + + + +
+ Debian testing security team - Advisory +
+ + +
+ + +

DTSA-33-1

+
+
Date Reported:
+
February 12th, 2007
+
Affected Package:
+
wordpress
+
Vulnerability:
+
multiple vulnerabilities
+
Problem-Scope:
+
remote
+
Debian-specific:
+
No
+
CVE:
+
+CVE-2007-0262 +CVE-2007-0539 +CVE-2007-0541 +
+
More information:
+
Various issues have been discovered in wordpress: 

+CVE-2007-0262 
+ wordpress does not properly verify that the m parameter value has the string 
+ data type, which allows remote attackers to obtain sensitive information via 
+ an invalid m[] parameter, as demonstrated by obtaining the path, and 
+ obtaining certain SQL information such as the table prefix. 

+CVE-2007-0539 
+ WordPress before 2.1 allows remote attackers to cause a denial of service 
+ (bandwidth or thread consumption) via pingback service calls with a source 
+ URI that corresponds to a large file, which triggers a long download session 
+ without a timeout constraint. 

+CVE-2007-0541 
+ WordPress allows remote attackers to determine the existence of arbitrary 
+ files, and possibly read portions of certain files, via pingback service 
+ calls with a source URI that corresponds to a local pathname, which triggers 
+ different fault codes for existing and non-existing files, and in certain 
+ configurations causes a brief file excerpt to be published as a blog comment. 

+Please note that wordpress is not present in sarge. 
+
+
For the testing distribution (etch) this is fixed in version 2.0.8-1
+
For the unstable distribution (sid) this is fixed in version 2.1.0-1
+
This upgrade is recommended if you use wordpress.
+
If you have the secure testing lines in your sources.list, you can update by running this command as root:
+ +
apt-get update && apt-get install wordpress
+
+ +
+
To use the Debian testing security archive, add the following lines to your /etc/apt/sources.list:
+
+
deb http://security.debian.org/ testing/updates main contrib non-free
+
deb-src http://security.debian.org/ testing/updates main contrib non-free
+
+
The archive signing key can be downloaded from
+
http://secure-testing.debian.net/ziyi-2005-7.asc
+ +
+ + +
+ + Valid HTML 4.01! + + Valid CSS! + + + + diff --git a/website/list.html b/website/list.html index 95fcccf557..ce754ebe12 100644 --- a/website/list.html +++ b/website/list.html @@ -97,6 +97,8 @@
cross-site request forgery (CSRF) vulnerability
[February 1st, 2007] DTSA-32-1 bcfg2
programming error
+
[February 12th, 2007] DTSA-33-1 wordpress
+
multiple vulnerabilities

-- cgit v1.2.3