Sigurnosni propusti otkriveni su u radu programskog paketa bugzilla. Udaljeni napadači ih mogu iskoristiti za zaobilaženje postavljenih ograničenja, neovlašteni pristup sustavu, otkrivanje osjetljivih informacija i XSS napad.
Paket:
bugzilla 4.x
Operacijski sustavi:
Fedora 15, Fedora 16, Fedora 17
Kritičnost:
4.4
Problem:
CSRF, neodgovarajuća provjera ulaznih podataka, pogreška u programskoj komponenti, XSS
Iskorištavanje:
udaljeno
Posljedica:
neovlašteni pristup sustavu, otkrivanje osjetljivih informacija, zaobilaženje postavljenih ograničenja
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2012-0466, CVE-2012-0465, CVE-2012-0453
Izvorni ID preporuke:
FEDORA-2012-6282
Izvor:
Fedora
Problem:
Otkrivena je XSS ranjivost u komponenti "template/en/default/list/list.js.tmpl", neodgovarajuća obrada HTTP zaglavlja "X-Forwarded-For" i CSRF ranjivost u skripti "xmlrpc.cgi".
Posljedica:
Ranjivosti se mogu iskoristiti za zaobilaženje postavljenih ograničenja, neovlašteni pristup, pregled određenih podataka i XSS napad.
Rješenje:
Korisnicima se preporuča primjena službenih programskih rješenja.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-6282
2012-04-20 06:00:08
--------------------------------------------------------------------------------
Name : bugzilla
Product : Fedora 17
Version : 4.0.6
Release : 1.fc17
URL : http://www.bugzilla.org/
Summary : Bug tracking system
Description :
Bugzilla is a popular bug tracking system used by multiple open source projects
It requires a database engine installed - either MySQL, PostgreSQL or Oracle.
Without one of these database engines (local or remote), Bugzilla will not work
- see the Release Notes for details.
--------------------------------------------------------------------------------
Update Information:
The following security issues have been discovered
in Bugzilla:
* When abusing the X-FORWARDED-FOR header, an attacker could bypass the lockout
policy allowing a possible brute-force discovery of a valid user password.
* An attacker can get access to some bug information using the victim's
credentials using a specially crafted HTML page.
References: https://bugzilla.mozilla.org/show_bug.cgi?id=745397
CVE Number: CVE-2012-0466
References: https://bugzilla.mozilla.org/show_bug.cgi?id=728639
CVE Number: CVE-2012-0465
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update bugzilla' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-6396
2012-04-22 02:45:04
--------------------------------------------------------------------------------
Name : bugzilla
Product : Fedora 15
Version : 3.6.9
Release : 1.fc15
URL : http://www.bugzilla.org/
Summary : Bug tracking system
Description :
Bugzilla is a popular bug tracking system used by multiple open source projects
It requires a database engine installed - either MySQL, PostgreSQL or Oracle.
Without one of these database engines (local or remote), Bugzilla will not work
- see the Release Notes for details.
--------------------------------------------------------------------------------
Update Information:
The following security issues have been discovered
in Bugzilla:
* When abusing the X-FORWARDED-FOR header, an attacker could bypass the lockout
policy allowing a possible brute-force discovery of a valid user password.
* An attacker can get access to some bug information using the victim's
credentials using a specially crafted HTML page.
References: https://bugzilla.mozilla.org/show_bug.cgi?id=745397
CVE Number: CVE-2012-0466
References: https://bugzilla.mozilla.org/show_bug.cgi?id=728639
CVE Number: CVE-2012-0465
--------------------------------------------------------------------------------
ChangeLog:
* Fri Apr 20 2012 Emmanuel Seyman <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 3.6.9-1
- Update to 3.6.9 (CVE-2012-0465, CVE-2012-0466)
* Wed Feb 1 2012 Emmanuel Seyman <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 3.6.8-1
- Update to 3.6.8 to fix security flaws (#786550)
- Correct upstream URL in README.fedora.bugzilla, thanks to Ken Dreyer (#783014)
* Sun Jan 8 2012 Emmanuel Seyman <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 3.6.7-1
- Update to 3.6.7
- Add perl(Locale::Language) to the Requires
- Add index.html to the DirectoryIndex
- Fix typo in README.fedora.bugzilla
* Fri Aug 5 2011 Emmanuel Seyman <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 3.6.6-1
- Update to 3.6.6
- Move graphs to /var/lib/bugzilla/graphs.
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update bugzilla' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-6368
2012-04-22 02:43:51
--------------------------------------------------------------------------------
Name : bugzilla
Product : Fedora 16
Version : 4.0.6
Release : 1.fc16
URL : http://www.bugzilla.org/
Summary : Bug tracking system
Description :
Bugzilla is a popular bug tracking system used by multiple open source projects
It requires a database engine installed - either MySQL, PostgreSQL or Oracle.
Without one of these database engines (local or remote), Bugzilla will not work
- see the Release Notes for details.
--------------------------------------------------------------------------------
Update Information:
The following security issues have been discovered
in Bugzilla:
* When abusing the X-FORWARDED-FOR header, an attacker could bypass the lockout
policy allowing a possible brute-force discovery of a valid user password.
* An attacker can get access to some bug information using the victim's
credentials using a specially crafted HTML page.
References: https://bugzilla.mozilla.org/show_bug.cgi?id=745397
CVE Number: CVE-2012-0466
References: https://bugzilla.mozilla.org/show_bug.cgi?id=728639
CVE Number: CVE-2012-0465
--------------------------------------------------------------------------------
ChangeLog:
* Fri Apr 20 2012 Emmanuel Seyman <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.0.6-1
- Update to 4.0.6
* Fri Feb 24 2012 Emmanuel Seyman <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.0.5-1
- Update to 4.0.5 to fix security issues (CVE-2012-0453)
- Block all ModPerl::* and Apache2::* from requires
- Remove rpm4.8 filters
* Wed Feb 1 2012 Emmanuel Seyman <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.0.4-1
- Update to 4.0.4 to fix security flaws (#786550)
- Correct upstream URL in README.fedora.bugzilla, thanks to Ken Dreyer (#783014)
* Sun Jan 8 2012 Emmanuel Seyman <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.0.3-1
- Update to 4.0.3
- Add perl(Locale::Language) to the Requires
- Add index.html to the DirectoryIndex
- Fix typo in README.fedora.bugzilla
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update bugzilla' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke