LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: October 20th, 2014
Linux Advisory Watch: October 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Debian: 2322-1: bugzilla: Multiple vulnerabilities Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian Several vulnerabilities were discovered in Bugzilla, a web-based bug tracking system. CVE-2010-4572 [More...]
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2322-1                   security@debian.org
http://www.debian.org/security/                        Jonathan Wiltshire
October 10, 2011                       http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : bugzilla
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-201-2979 CVE-2010-4567 CVE-2010-4568 CVE-2010-4572 
                 CVE-2011-0046 CVE-2011-0048 CVE-2011-2379 CVE-2011-2380 
                 CVE-2011-2381 CVE-2011-2978 

Several vulnerabilities were discovered in Bugzilla, a web-based bug
tracking system.

CVE-2010-4572

  By inserting particular strings into certain URLs, it was
  possible to inject both headers and content to any
  browser.

CVE-2010-4567, CVE-2011-0048

  Bugzilla has a "URL" field that can contain several types
  of URL, including "javascript:" and "data:" URLs. However,
  it does not make "javascript:" and "data:" URLs into
  clickable links, to protect against cross-site scripting
  attacks or other attacks. It was possible to bypass this
  protection by adding spaces into the URL in places that
  Bugzilla did not expect them. Also, "javascript:" and
  "data:" links were *always* shown as clickable to
  logged-out users.

CVE-2010-4568

  It was possible for a user to gain unauthorized access to
  any Bugzilla account in a very short amount of time (short
  enough that the attack is highly effective).

CVE-2011-0046

  Various pages were vulnerable to Cross-Site Request
  Forgery attacks. Most of these issues are not as serious
  as previous CSRF vulnerabilities.

CVE-2011-2978

  When a user changes his email address, Bugzilla trusts
  a user-modifiable field for obtaining the current e-mail
  address to send a confirmation message to. If an attacker
  has access to the session of another user (for example,
  if that user left their browser window open in a public
  place), the attacker could alter this field to cause
  the email-change notification to go to their own address.
  This means that the user would not be notified that his
  account had its email address changed by the attacker.

CVE-2011-2381

  For flagmails only, attachment descriptions with a newline
  in them could lead to the injection of crafted headers in
  email notifications when an attachment flag is edited.

CVE-2011-2379

  Bugzilla uses an alternate host for attachments when
  viewing them in raw format to prevent cross-site scripting
  attacks. This alternate host is now also used when viewing
  patches in "Raw Unified" mode because Internet Explorer 8
  and older, and Safari before 5.0.6 do content sniffing,
  which could lead to the execution of malicious code.

CVE-2011-2380 CVE-201-2979

  Normally, a group name is confidential and is only visible
  to members of the group, and to non-members if the group
  is used in bugs. By crafting the URL when creating or
  editing a bug, it was possible to guess if a group existed
  or not, even for groups which weren't used in bugs and so
  which were supposed to remain confidential.

For the oldstable distribution (lenny), it has not been practical to
backport patches to fix these bugs. Users of bugzilla on lenny are 
strongly advised to upgrade to the version in the squeeze distribution.

For the stable distribution (squeeze), these problems have been fixed in
version 3.6.2.0-4.4.

For the testing distribution (wheezy) and the unstable distribution (sid),
the bugzilla packages have been removed.

We recommend that you upgrade your bugzilla packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org


-----BEGIN PGP SIGNATURE-----
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Pro-Privacy Senator Wyden on Fighting the NSA From Inside the System
NIST to hypervisor admins: secure your systems
Quick PHP patch beats slow research reveal
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.