Lucene search

K
openvasCopyright (c) 2011 E-Soft Inc. http://www.securityspace.comOPENVAS:70411
HistoryOct 16, 2011 - 12:00 a.m.

Debian Security Advisory DSA 2322-1 (bugzilla)

2011-10-1600:00:00
Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
plugins.openvas.org
13

0.018 Low

EPSS

Percentile

86.8%

The remote host is missing an update to bugzilla
announced via advisory DSA 2322-1.

# OpenVAS Vulnerability Test
# $Id: deb_2322_1.nasl 6613 2017-07-07 12:08:40Z cfischer $
# Description: Auto-generated from advisory DSA 2322-1 (bugzilla)
#
# Authors:
# Thomas Reinke <[email protected]>
#
# Copyright:
# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
# Text descriptions are largely excerpted from the referenced
# advisory, and are Copyright (c) the respective author(s)
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# or at your option, GNU General Public License version 3,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#

include("revisions-lib.inc");
tag_insight = "Several vulnerabilities were discovered in Bugzilla, a web-based bug
tracking system.

CVE-2010-4572

By inserting particular strings into certain URLs, it was
possible to inject both headers and content to any
browser.

CVE-2010-4567, CVE-2011-0048

Bugzilla has a URL field that can contain several types
of URL, including javascript: and data: URLs. However,
it does not make javascript: and data: URLs into
clickable links, to protect against cross-site scripting
attacks or other attacks. It was possible to bypass this
protection by adding spaces into the URL in places that
Bugzilla did not expect them. Also, javascript: and
data: links were *always* shown as clickable to
logged-out users.

CVE-2010-4568

It was possible for a user to gain unauthorized access to
any Bugzilla account in a very short amount of time (short
enough that the attack is highly effective).

CVE-2011-0046

Various pages were vulnerable to Cross-Site Request
Forgery attacks. Most of these issues are not as serious
as previous CSRF vulnerabilities.

CVE-2011-2978

When a user changes his email address, Bugzilla trusts
a user-modifiable field for obtaining the current e-mail
address to send a confirmation message to. If an attacker
has access to the session of another user (for example,
if that user left their browser window open in a public
place), the attacker could alter this field to cause
the email-change notification to go to their own address.
This means that the user would not be notified that his
account had its email address changed by the attacker.

CVE-2011-2381

For flagmails only, attachment descriptions with a newline
in them could lead to the injection of crafted headers in
email notifications when an attachment flag is edited.

CVE-2011-2379

Bugzilla uses an alternate host for attachments when
viewing them in raw format to prevent cross-site scripting
attacks. This alternate host is now also used when viewing
patches in Raw Unified mode because Internet Explorer 8
and older, and Safari before 5.0.6 do content sniffing,
which could lead to the execution of malicious code.

CVE-2011-2380 CVE-201-2979

Normally, a group name is confidential and is only visible
to members of the group, and to non-members if the group
is used in bugs. By crafting the URL when creating or
editing a bug, it was possible to guess if a group existed
or not, even for groups which weren't used in bugs and so
which were supposed to remain confidential.

For the oldstable distribution (lenny), it has not been practical to
backport patches to fix these bugs. Users of bugzilla on lenny are 
strongly advised to upgrade to the version in the squeeze distribution.

For the stable distribution (squeeze), these problems have been fixed in
version 3.6.2.0-4.4.

For the testing distribution (wheezy) and the unstable distribution (sid),
the bugzilla packages have been removed.

We recommend that you upgrade your bugzilla packages.";
tag_summary = "The remote host is missing an update to bugzilla
announced via advisory DSA 2322-1.";

tag_solution = "https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202322-1";


if(description)
{
 script_id(70411);
 script_version("$Revision: 6613 $");
 script_tag(name:"last_modification", value:"$Date: 2017-07-07 14:08:40 +0200 (Fri, 07 Jul 2017) $");
 script_tag(name:"creation_date", value:"2011-10-16 23:01:53 +0200 (Sun, 16 Oct 2011)");
 script_tag(name:"cvss_base", value:"7.5");
 script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_cve_id("CVE-2010-4567", "CVE-2010-4568", "CVE-2010-4572", "CVE-2011-0046", "CVE-2011-0048", "CVE-2011-2379", "CVE-2011-2380", "CVE-2011-2381", "CVE-2011-2978");
 script_name("Debian Security Advisory DSA 2322-1 (bugzilla)");



 script_category(ACT_GATHER_INFO);

 script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
 script_family("Debian Local Security Checks");
 script_dependencies("gather-package-list.nasl");
 script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages");
 script_tag(name : "solution" , value : tag_solution);
 script_tag(name : "insight" , value : tag_insight);
 script_tag(name : "summary" , value : tag_summary);
 script_tag(name:"qod_type", value:"package");
 script_tag(name:"solution_type", value:"VendorFix");
 exit(0);
}

#
# The script code starts here
#

include("pkg-lib-deb.inc");

res = "";
report = "";
if ((res = isdpkgvuln(pkg:"bugzilla3", ver:"3.6.2.0-4.4", rls:"DEB6.0")) != NULL) {
    report += res;
}
if ((res = isdpkgvuln(pkg:"bugzilla3-doc", ver:"3.6.2.0-4.4", rls:"DEB6.0")) != NULL) {
    report += res;
}

if (report != "") {
    security_message(data:report);
} else if (__pkg_match) {
    exit(99); # Not vulnerable.
}