[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DTSA-33-1] New wordpress packages fix multiple vulnerabilities

Hash: SHA1

- --------------------------------------------------------------------------
Debian Testing Security Advisory DTSA-33-1             February 12th, 2007
secure-testing-team@lists.alioth.debian.org                  Neil McGovern
- --------------------------------------------------------------------------

Package        : wordpress
Vulnerability  : multiple vulnerabilities
Problem-Scope  : remote
Debian-specific: No
CVE ID         : CVE-2007-0262 CVE-2007-0539 CVE-2007-0541 

Various issues have been discovered in wordpress:

  wordpress does not properly verify that the m parameter value has the string
  data type, which allows remote attackers to obtain sensitive information via
  an invalid m[] parameter, as demonstrated by obtaining the path, and
  obtaining certain SQL information such as the table prefix.

  WordPress before 2.1 allows remote attackers to cause a denial of service
  (bandwidth or thread consumption) via pingback service calls with a source
  URI that corresponds to a large file, which triggers a long download session
  without a timeout constraint.

  WordPress allows remote attackers to determine the existence of arbitrary
  files, and possibly read portions of certain files, via pingback service
  calls with a source URI that corresponds to a local pathname, which triggers
  different fault codes for existing and non-existing files, and in certain
  configurations causes a brief file excerpt to be published as a blog comment.

Please note that wordpress is not present in sarge.

For the testing distribution (etch) this is fixed in version

For the unstable distribution (sid) this is fixed in version

This upgrade is recommended if you use wordpress.

The Debian testing security team does not track security issues for the
stable (sarge) and oldstable (woody) distributions. If stable is vulnerable,
the Debian security team will make an announcement once a fix is ready.

Upgrade Instructions
- --------------------

To use the Debian testing security archive, add the following lines to
your /etc/apt/sources.list:

deb http://security.debian.org/ testing/updates main contrib non-free
deb-src http://security.debian.org/ testing/updates main contrib non-free

To install the update, run this command as root:

apt-get update && apt-get install wordpress

For further information about the Debian testing security team, please refer
to http://secure-testing-master.debian.net/
Version: GnuPG v1.4.6 (GNU/Linux)


Reply to: