Lucene search

K
mageiaGentoo FoundationMGASA-2016-0057
HistoryFeb 09, 2016 - 4:05 p.m.

Updated radicale packages fix CVE-2015-8748

2016-02-0916:05:25
Gentoo Foundation
advisories.mageia.org
9

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

0.007 Low

EPSS

Percentile

79.9%

Updated radicale package fixes security vulnerabilities: If an attacker is able to authenticate with a user name like .*', he can bypass read/write limitations imposed by regex-based rules, including the built-in rules owner_write’ (read for everybody, write for the calendar owner) and `owner_only’ (read and write for the the calendar owner) (CVE-2015-8748). The radicale package has been updated to version 1.1.1, fixing this issue and several other security issues.

OSVersionArchitecturePackageVersionFilename
Mageia5noarchradicale< 1.1.1-1.1radicale-1.1.1-1.1.mga5

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

0.007 Low

EPSS

Percentile

79.9%