From: | Matteo Beccati <php(at)beccati(dot)com> |
---|---|
To: | pgsql-www <pgsql-www(at)postgresql(dot)org> |
Subject: | Fwd: [Full-disclosure] [ MDVSA-2011:003 ] MHonArc |
Date: | 2011-01-10 18:04:40 |
Message-ID: | 4D2B4A38.8010607@beccati.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-www |
Hi everyone,
FYI, I've seen this passing on full-disclosure and it seems that our
archives are using an affected version of MHonArc.
-------- Messaggio originale --------
Oggetto: [Full-disclosure] [ MDVSA-2011:003 ] MHonArc
Data: Mon, 10 Jan 2011 16:44:01 +0100
Mittente: security(at)mandriva(dot)com
Rispondi-a: xsecurity(at)mandriva(dot)com
A: full-disclosure(at)lists(dot)grok(dot)org(dot)uk
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2011:003
http://www.mandriva.com/security/
_______________________________________________________________________
Package : MHonArc
Date : January 10, 2011
Affected: 2009.0, 2010.0, 2010.1, Corporate 4.0, Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
Multiple vulnerabilities has been found and corrected in MHonArc:
MHonArc 2.6.16 allows remote attackers to cause a denial of service
(CPU consumption) via start tags that are placed within other start
tags, as demonstrated by a
<bo<bo<bo<bo<body>dy>dy>dy>dy> sequence,
a different vulnerability than CVE-2010-4524 (CVE-2010-1677).
Cross-site scripting (XSS) vulnerability in lib/mhtxthtml.pl in
MHonArc 2.6.16 allows remote attackers to inject arbitrary web script
or HTML via a malformed start tag and end tag for a SCRIPT element,
as demonstrated by <scr<body>ipt> and
</scr<body>ipt> sequences
(CVE-2010-4524).
Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490
The updated packages have been upgraded to the latest version (2.6.18)
which is not vulnerable to these issues.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1677
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4524
_______________________________________________________________________
From | Date | Subject | |
---|---|---|---|
Next Message | Michael Smith | 2011-01-13 22:47:58 | Correction for the Binary Replication Tutorial |
Previous Message | David Fetter | 2011-01-05 21:15:15 | Re: Approval of announce posts |