From 889e269e48e52cf8b76a41f9784a44f3ca7509c5 Mon Sep 17 00:00:00 2001 From: stas Date: Wed, 10 Sep 2008 10:53:02 +0000 Subject: - Document wordpress, rails and mysql vulnerabilties. Reviewed by: remko Approved by: portmgr (secteam approved: remko, blanket vuxml) --- security/vuxml/vuln.xml | 95 +++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 95 insertions(+) (limited to 'security') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 985fe6374464..006b65aa6bb8 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,101 @@ Note: Please add new entries to the beginning of this file. --> + + mysql -- MyISAM table privileges secuity bypass vulnerability + + + mysql-server + 6.06.0.5 + 5.15.1.24 + 5.05.0.67 + 4.15.0 + + + + +

SecurityFocus reports:

+
+

MySQL is prone to a security-bypass vulnerability. + An attacker can exploit this issue to overwrite existing + table files in the MySQL data directory, bypassing certain + security restrictions.

+
+ +
+ + 29106 + CVE-2008-2079 + + + 2008-05-05 + 2008-09-10 + +
+ + + rubygem-rails -- SQL injection vulnerability + + + rubygem-rails + 0 + + + + +

Jonathan Weiss reports, that it is possible + to perform an SQL injection in Rails applications + via not correctly sanitized :limit and :offset + parameters. It is possible to change arbitrary + values in affected tables or gain access to the + sensitive data.

+ +
+ + http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1 + + + 2008-09-08 + 2008-09-10 + +
+ + + wordpress -- remote privilege escalation + + + wordpress + wordpress-mu + de-wordpress + zh-wordpress + 0 + + + + +

The Wordpress development team reports:

+
+

With open registration enabled, it is possible in WordPress + versions 2.6.1 and earlier to craft a username such that it + will allow resetting another users password to a randomly + generated password. The randomly generated password is not + disclosed to the attacker, so this problem by itself is annoying + but not a security exploit. However, this attack coupled with a + weakness in the random number seeding in mt_rand() could be used + to predict the randomly generated password.

+
+ +
+ + 31068 + http://wordpress.org/development/2008/09/wordpress-262/ + + + 2008-09-08 + 2008-09-10 + +
+ FreeBSD -- Remote kernel panics on IPv6 connections -- cgit