Lucene search

K
mageiaGentoo FoundationMGASA-2014-0493
HistoryNov 26, 2014 - 8:29 p.m.

Updated wordpress package fixes security vulnerabilities

2014-11-2620:29:06
Gentoo Foundation
advisories.mageia.org
9

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.264 Low

EPSS

Percentile

96.7%

XSS in wptexturize() via comments or posts, exploitable for unauthenticated users (CVE-2014-9031). XSS in media playlists (CVE-2014-9032). CSRF in the password reset process (CVE-2014-9033). Denial of service for giant passwords. The phpass library by Solar Designer was used in both projects without setting a maximum password length, which can lead to CPU exhaustion upon hashing (CVE-2014-9034). XSS in Press This (CVE-2014-9035). XSS in HTML filtering of CSS in posts (CVE-2014-9036). Hash comparison vulnerability in old-style MD5-stored passwords (CVE-2014-9037). SSRF: Safe HTTP requests did not sufficiently block the loopback IP address space (CVE-2014-9038). Previously an email address change would not invalidate a previous password reset email (CVE-2014-9039).

OSVersionArchitecturePackageVersionFilename
Mageia3noarchwordpress< 3.9.3-1wordpress-3.9.3-1.mga3
Mageia4noarchwordpress< 3.9.3-1wordpress-3.9.3-1.mga4

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.264 Low

EPSS

Percentile

96.7%