Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.71274
Kategorie:FreeBSD Local Security Checks
Titel:FreeBSD Ports: bugzilla
Zusammenfassung:The remote host is missing an update to the system; as announced in the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following package is affected: bugzilla

CVE-2012-0465
Bugzilla 3.5.x and 3.6.x before 3.6.9, 3.7.x and 4.0.x before 4.0.6,
and 4.1.x and 4.2.x before 4.2.1, when the inbound_proxies option is
enabled, does not properly validate the X-Forwarded-For HTTP header,
which allows remote attackers to bypass the lockout policy via a
series of authentication requests with (1) different IP address
strings in this header or (2) a long string in this header.
CVE-2012-0466
template/en/default/list/list.js.tmpl in Bugzilla 2.x and 3.x before
3.6.9, 3.7.x and 4.0.x before 4.0.6, and 4.1.x and 4.2.x before 4.2.1
does not properly handle multiple logins, which allows remote
attackers to conduct cross-site scripting (XSS) attacks and obtain
sensitive bug information via a crafted web page.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2012-0465
Bugtraq: 20120418 Security advisory for Bugzilla 4.2.1, 4.0.6 and 3.6.9 (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2012-04/0135.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079604.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079432.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079481.html
Common Vulnerability Exposure (CVE) ID: CVE-2012-0466
CopyrightCopyright (c) 2012 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.