LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: September 22nd, 2014
Linux Advisory Watch: September 19th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Fedora 11 Update: drupal-6.14-1.fc11 Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Fedora Fixes SA-CORE-2009-008 http://drupal.org/node/579482 Remember to log in to your site as the admin user before upgrading this package. After upgrading the package, browse to http://host/drupal/update.php to run the upgrade script. Multiple vulnerabilities and weaknesses were discovered in Drupal. OpenID association cross site request forgeries The OpenID module in Drupal 6 allows users to create an account or log into a Drupal site using one or more OpenID identities. The core OpenID module does not correctly implement Form API for the form that allows one to link user accounts with OpenID identifiers. A malicious user is therefore able to use cross site request forgeries to add attacker controlled OpenID identities to existing accounts. These OpenID identities can then be used to gain access to the affected accounts. This issue affects Drupal 6.x only. OpenID impersonation The OpenID module is not a compliant implementation of the OpenID Authentication 2.0 specification. An implementation error allows a user to access the account of another user when they share the same OpenID 2.0 provider. This issue affects Drupal 6.x only. File upload File uploads with certain extensions are not correctly processed by the File API. This may lead to the creation of files that are executable by Apache. The .htaccess that is saved into the files directory by Drupal should normally prevent execution. The files are only executable when the server is configured to ignore the directives in the .htaccess file. This issue affects Drupal 6.x only. Session fixation Drupal doesn't regenerate the session ID when an anonymous user follows the one time login link used to confirm email addresses and reset forgotten passwords. This enables a malicious user to fix and reuse the session id of a victim under certain circumstances. This issue affects Drupal 5.x only. Versions affected * Drupal 6.x before version 6.14. * Drupal 5.x before version 5.20. Solution Install the latest version: * If you are running Drupal 6.x then upgrade to Drupal 6.14. * If you are running Drupal 5.x then upgrade to Drupal 5.20. If you are unable to upgrade immediately, you can apply a patch to secure your installation until you are able to do a proper upgrade. Theses patches fix the security vulnerabilities, but do not contain other fixes which were released in Drupal 6.14 or Drupal 5.20. * To patch Drupal 6.13 use SA- CORE-2009-008-6.13.patch. * To patch Drupal 5.19 use SA- CORE-2009-008-5.19.patch. Important note: Some users using OpenID might not be able to use the existing OpenID associations to login after the upgrade. These users should use the one time login via password recovery to get access to their user account and re-add desired associations. These users likely had issues with OpenID logins prior to the upgrade. Reported by The session fixation issue was reported by Noel Sharpe. OpenID impersonation was reported by Robert Metcalf. OpenID association CSRF was reported by Heine Deelstra (*). The file upload issue was reported by Heine Deelstra (*). (*) Member of the Drupal security team Fixed by The session fixation issue was fixed by Jakub Suchy. The OpenID and file upload issues were fixed by Heine Deelstra. Contact The security team for Drupal can be reached at security at drupal.org or via the form at http://drupal.org/contact.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2009-9721
2009-09-18 23:21:42
--------------------------------------------------------------------------------

Name        : drupal
Product     : Fedora 11
Version     : 6.14
Release     : 1.fc11
URL         : http://www.drupal.org
Summary     : An open-source content-management platform
Description :
Equipped with a powerful blend of features, Drupal is a Content Management
System written in PHP that can support a variety of websites ranging from
personal weblogs to large community-driven websites.  Drupal is highly
configurable, skinnable, and secure.

--------------------------------------------------------------------------------
Update Information:

Fixes SA-CORE-2009-008  http://drupal.org/node/579482    Remember to log in to
your site as the admin user before upgrading this package. After upgrading the
package, browse to http://host/drupal/update.php to run the upgrade script.
Multiple vulnerabilities and weaknesses were discovered in Drupal.  OpenID
association cross site request forgeries    The OpenID module in Drupal 6 allows
users to create an account or log into a Drupal site using one or more OpenID
identities.    The core OpenID module does not correctly implement Form API for
the form that allows one to link user accounts with OpenID identifiers. A
malicious user is therefore able to use cross site request forgeries to add
attacker controlled OpenID identities to existing accounts. These OpenID
identities can then be used to gain access to the affected accounts.    This
issue affects Drupal 6.x only.  OpenID impersonation    The OpenID module is not
a compliant implementation of the OpenID Authentication 2.0 specification. An
implementation error allows a user to access the account of another user when
they share the same OpenID 2.0 provider.    This issue affects Drupal 6.x only.
File upload    File uploads with certain extensions are not correctly processed
by the File API. This may lead to the creation of files that are executable by
Apache. The .htaccess that is saved into the files directory by Drupal should
normally prevent execution. The files are only executable when the server is
configured to ignore the directives in the .htaccess file.    This issue affects
Drupal 6.x only.  Session fixation    Drupal doesn't regenerate the session ID
when an anonymous user follows the one time login link used to confirm email
addresses and reset forgotten passwords. This enables a malicious user to fix
and reuse the session id of a victim under certain circumstances.    This issue
affects Drupal 5.x only.  Versions affected        * Drupal 6.x before version
6.14.      * Drupal 5.x before version 5.20.    Solution    Install the latest
version:        * If you are running Drupal 6.x then upgrade to Drupal 6.14.
* If you are running Drupal 5.x then upgrade to Drupal 5.20.    If you are
unable to upgrade immediately, you can apply a patch to secure your installation
until you are able to do a proper upgrade. Theses patches fix the security
vulnerabilities, but do not contain other fixes which were released in Drupal
6.14 or Drupal 5.20.        * To patch Drupal 6.13 use SA-
CORE-2009-008-6.13.patch.      * To patch Drupal 5.19 use SA-
CORE-2009-008-5.19.patch.    Important note: Some users using OpenID might not
be able to use the existing OpenID associations to login after the upgrade.
These users should use the one time login via password recovery to get access to
their user account and re-add desired associations. These users likely had
issues with OpenID logins prior to the upgrade.  Reported by    The session
fixation issue was reported by Noel Sharpe.  OpenID impersonation was reported
by Robert Metcalf.  OpenID association CSRF was reported by Heine Deelstra (*).
The file upload issue was reported by Heine Deelstra (*).    (*) Member of the
Drupal security team  Fixed by    The session fixation issue was fixed by Jakub
Suchy.  The OpenID and file upload issues were fixed by Heine Deelstra.  Contact
The security team for Drupal can be reached at security at drupal.org or via the
form at http://drupal.org/contact.
--------------------------------------------------------------------------------
ChangeLog:

* Wed Sep 16 2009 Jon Ciesla  - 6.14-1
- Update to 6.14, SA-CORE-2009-008.
* Fri Jul 24 2009 Fedora Release Engineering  - 6.13-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild
* Thu Jul  2 2009 Jon Ciesla  - 6.13-1
- Update to 6.11, SA-CORE-2009-007.
- Added clarifying text on module installation to readme, BZ 500707.
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update drupal' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------

_______________________________________________
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Researcher Discloses Wi-Fi Thermostat Vulnerabilities
5 reasons why hackers own your organization
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.