[SECURITY] [DSA 3075-1] drupal7 security update

2014-12-01T00:00:00
ID SECURITYVULNS:DOC:31427
Type securityvulns
Reporter Securityvulns
Modified 2014-12-01T00:00:00

Description

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512


Debian Security Advisory DSA-3075-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso November 20, 2014 http://www.debian.org/security/faq


Package : drupal7 CVE ID : CVE-2014-9015 CVE-2014-9016

Two vulnerabilities were discovered in Drupal, a fully-featured content management framework. The Common Vulnerabilities and Exposures project identifies the following issues:

CVE-2014-9015

Aaron Averill discovered that a specially crafted request can give a
user access to another user's session, allowing an attacker to
hijack a random session.

CVE-2014-9016

Michael Cullum, Javier Nieto and Andres Rojas Guerrero discovered
that the password hashing API allows an attacker to send
specially crafted requests resulting in CPU and memory
exhaustion. This may lead to the site becoming unavailable or
unresponsive (denial of service).

Custom configured session.inc and password.inc need to be audited as well to verify if they are prone to these vulnerabilities. More information can be found in the upstream advisory at https://www.drupal.org/SA-CORE-2014-006

For the stable distribution (wheezy), these problems have been fixed in version 7.14-2+deb7u8.

We recommend that you upgrade your drupal7 packages.

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIcBAEBCgAGBQJUbhY1AAoJEAVMuPMTQ89Ed70P/ioZRx8NGrWbufG9n0NLMbOb FIZsLGPoIfJZ6WioOosvn+LK5/6aTR88Naqb0AOi+2rcGDqjGziXNKk7A2jGs20F MlGCu8nr17D/a5MV0HJF+Vig903SX1hrb/6fgn2UHA3H1KkmzsefuIDqz+yCy800 6G2+ChFYM4Yb/Bc4diGR03Y4VU/CZVsa3CHc97seFqrziI51JhKgwd5suB0PiwGD K5YBn0fbe8rLIEY6xvgXFl9+HAlxTw7HK3Zp3/PLNFc9P/SJPUyXRoS6vefMp/7n yjFilyp1rjqnTpADTv3E4nYNbB3BWfaAIxCVSwB4POwkcIwc1mHVNuP8iZJqZ/xY Yw6ybDFyVmJA+wj0JssiyYjjp0vIVZi9J6801qryo1g4Em24uGc5rwqY739/ie20 63SUyY/UKqGBYhOM0crbijthI9FQHHgHV/WY227tNPLzcayeWtK52rQUKJVOg5dp scNDnLm5Zmpl601MxJLdRA3EJ64C8djBbHniNrFrXtrcy80wffmP775TWXZwL3lA xV56bfHDPyzXrz3m8rfddXkwxgYU0Z90mjGxZZLgu65wFk+zCumGPmY832W7Z4Hc t0fG70bVw/LMVL9DqoSLHv4kbxhQz8F6wOGCAzLCjdrAWVeIxbcP6GS56DNHYWdA uz8LlLbrzeuot+/3/WQw =kSed -----END PGP SIGNATURE-----