From 1da0c559b8b67046ca3e3065302ea0a815686b72 Mon Sep 17 00:00:00 2001
From: Martin Wilke This patch addresses three possible buffer overflows in
function unique_service_name().The three issues have the
folowing CVE numbers: Notice that the following issues have already been dealt by
previous work:
+
+
+
Certain Connection header values will trigger an endless loop, for example: "Connection: TE,,Keep-Alive"
-On receiving such value, lighttpd will enter an endless loop, - detecting an empty token but not incrementing the current string +
On receiving such value, lighttpd will enter an endless loop, + detecting an empty token but not incrementing the current string position, and keep reading the ',' again and again.
-This bug was introduced in 1.4.31, when we fixed an "invalid read" - bug (it would try to read the byte before the string if it started +
This bug was introduced in 1.4.31, when we fixed an "invalid read" + bug (it would try to read the byte before the string if it started with ',', although the value wasn't actually used).
Sebastien Helleu reports:
-Untrusted command for function hook_process could lead to +
Untrusted command for function hook_process could lead to execution of commands, because of shell expansions.
Workaround with a non-patched version: remove/unload all scripts calling function hook_process (for maximum safety).
@@ -2092,9 +2092,9 @@ executed in your Internet Explorer while displaying the email.Sebastien Helleu reports:
-@@ -2654,13 +2654,13 @@ executed in your Internet Explorer while displaying the email.A buffer overflow is causing a crash or freeze of WeeChat when +
A buffer overflow is causing a crash or freeze of WeeChat when decoding IRC colors in strings.
-Workaround for a non-patched version: +
Workaround for a non-patched version: /set irc.network.colors_receive off
Arbitrary PHP code execution
A bug in the installer code was identified that allows an attacker to re-install Drupal using an external database server under certain - transient conditions. This could allow the attacker to execute + transient conditions. This could allow the attacker to execute arbitrary PHP code on the original server.
@@ -2792,20 +2792,20 @@ executed in your Internet Explorer while displaying the email. Information disclosure - OpenID module
For sites using the core OpenID module, an information disclosure - vulnerability was identified that allows an attacker to read files + vulnerability was identified that allows an attacker to read files on the local filesystem by attempting to log in to the site using a malicious OpenID server.
Host header poisoning
Some parts of Django -- independent of end-user-written applications -- make use of full URLs, including domain name, which are generated - from the HTTP Host header. Some attacks against this are beyond Django's - ability to control, and require the web server to be properly configured; + from the HTTP Host header. Some attacks against this are beyond Django's + ability to control, and require the web server to be properly configured; Django's documentation has for some time contained notes advising users on such configuration.
Django's own built-in parsing of the Host header is, however, still vulnerable, as was reported to us recently. The Host header parsing - in Django 1.3 and Django 1.4 -- specifically, django.http.HttpRequest.get_host() - -- was incorrectly handling username/password information in the header. + in Django 1.3 and Django 1.4 -- specifically, django.http.HttpRequest.get_host() + -- was incorrectly handling username/password information in the header. Thus, for example, the following Host header would be accepted by Django when running on "validsite.com":
Host: validsite.com:random@evilsite.com
Using this, an attacker can cause parts of Django -- particularly the password-reset mechanism -- to generate and display arbitrary URLs to users.
-To remedy this, the parsing in HttpRequest.get_host() is being modified; Host +
To remedy this, the parsing in HttpRequest.get_host() is being modified; Host headers which contain potentially dangerous content (such as username/password pairs) now raise the exception django.core.exceptions.SuspiciousOperation.
@@ -3312,14 +3312,14 @@ executed in your Internet Explorer while displaying the email.Secunia reports:
A vulnerability has been discovered in OpenX, which can be - exploited by malicious people to conduct SQL injection + exploited by malicious people to conduct SQL injection attacks.
-Input passed via the "xajaxargs" parameter to - www/admin/updates-history.php (when "xajax" is set to - "expandOSURow") is not properly sanitised in e.g. the - "queryAuditBackupTablesByUpgradeId()" function +
Input passed via the "xajaxargs" parameter to + www/admin/updates-history.php (when "xajax" is set to + "expandOSURow") is not properly sanitised in e.g. the + "queryAuditBackupTablesByUpgradeId()" function (lib/OA/Upgrade/DB_UpgradeAuditor.php) before being used in SQL - queries. This can be exploited to manipulate SQL queries by + queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
The vulnerability is confirmed in version 2.8.9. Prior versions may also be affected.
@@ -3486,7 +3486,7 @@ executed in your Internet Explorer while displaying the email.Kurt Seifried reports:
There is an issue in ImageMagick that is also present in - GraphicsMagick. CVE-2011-3026 deals with libpng memory + GraphicsMagick. CVE-2011-3026 deals with libpng memory allocation, and limitations have been added so that a bad PNG can't cause the system to allocate a lot of memory and a denial of service. However on further investigation of @@ -4148,7 +4148,7 @@ executed in your Internet Explorer while displaying the email.
Mediawiki reports:
(Bug 39700) Wikipedia administrator Writ Keeper discovered - a stored XSS (HTML injection) vulnerability. This was + a stored XSS (HTML injection) vulnerability. This was possible due to the handling of link text on File: links for nonexistent files. MediaWiki 1.16 and later is affected.
(Bug 39180) User Fomafix reported several DOM-based XSS @@ -4174,7 +4174,7 @@ executed in your Internet Explorer while displaying the email.
that did not exist in the external system, indefinitely.(Bug 39823) During internal review, it was discovered that metadata about blocks, hidden by a user with suppression rights, was visible - to administrators.
+ to administrators.
The Coppermine Team reports:
-The release covers several path disclosure vulnerabilities. If - unpatched, it's possible to generate an error that will reveal the - full path of the script. A remote user can determine the full path - to the web root directory and other potentially sensitive - information. Furthermore, the release covers a recently discovered - XSS vulnerability that allows (if unpatched) a malevolent visitor to +
The release covers several path disclosure vulnerabilities. If + unpatched, it's possible to generate an error that will reveal the + full path of the script. A remote user can determine the full path + to the web root directory and other potentially sensitive + information. Furthermore, the release covers a recently discovered + XSS vulnerability that allows (if unpatched) a malevolent visitor to include own script routines under certain conditions.