Lucene search

K
debianDebianDEBIAN:DLA-568-1:8D4E9
HistoryJul 29, 2016 - 4:23 p.m.

[SECURITY] [DLA 568-1] wordpress security update

2016-07-2916:23:23
lists.debian.org
16

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.004 Low

EPSS

Percentile

71.7%

Package : wordpress
Version : 3.6.1+dfsg-1~deb7u11
CVE ID : CVE-2016-5387 CVE-2016-5832 CVE-2016-5834
CVE-2016-5835 CVE-2016-5838 CVE-2016-5839
Debian Bug : 828225

Several vulnerabilities were discovered in wordpress, a web blogging
tool. The Common Vulnerabilities and Exposures project identifies the
following issues.

CVE-2016-5387
WordPress allows remote attackers to bypass intended
access restrictions and remove a category attribute from a post via
unspecified vectors.

CVE-2016-5832
The customizer in WordPress allows remote attackers to
bypass intended redirection restrictions via unspecified vectors.

CVE-2016-5834
Cross-site scripting (XSS) vulnerability in the
wp_get_attachment_link function in wp-includes/post-
template.php in WordPress allows remote
attackers to inject arbitrary web script or HTML via a crafted
attachment name.

CVE-2016-5835
WordPress allows remote attackers to obtain sensitive
revision-history information by leveraging the ability to read a
post related to wp-admin/includes/ajax-actions.php and
wp-admin/revision.php.

CVE-2016-5838
WordPress allows remote attackers to bypass intended password-
change restrictions by leveraging knowledge of a cookie.

CVE-2016-5839
WordPress allows remote attackers to bypass the
sanitize_file_name protection mechanism via unspecified vectors.

For Debian 7 "Wheezy", these problems have been fixed in version
3.6.1+dfsg-1~deb7u11.

We recommend that you upgrade your wordpress packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.004 Low

EPSS

Percentile

71.7%