drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in wordpress
Name: |
Mehrere Probleme in wordpress |
|
ID: |
FEDORA-2013-11590 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 19 |
|
Datum: |
Mi, 3. Juli 2013, 07:31 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2173
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2199
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2200
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2201
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2202
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2203
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2204
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2205 |
|
Applikationen: |
wordpress |
|
Originalnachricht |
Name : wordpress Product : Fedora 19 Version : 3.5.2 Release : 1.fc19 URL : http://www.wordpress.org Summary : Blog tool and publishing platform Description : Wordpress is an online publishing / weblog package that makes it very easy, almost trivial, to get information out to people on the web.
------------------------------------------------------------------------------- - Update Information:
WordPress 3.5.2 is now available. This is the second maintenance release of 3.5, fixing 12 bugs. This is a security release for all previous versions and we strongly encourage you to update your sites immediately. The WordPress security team resolved seven security issues, and this release also contains some additional security hardening.
The security fixes included:
- Blocking server-side request forgery attacks, which could potentially enable an attacker to gain access to a site.
- Disallow contributors from improperly publishing posts, reported by Konstantin Kovshenin, or reassigning the post’s authorship, reported by Luke Bryan.
- An update to the SWFUpload external library to fix cross-site scripting vulnerabilities. Reported by mala and Szymon Gruszecki. (Developers: More on SWFUpload here.)
- Prevention of a denial of service attack, affecting sites using password-protected posts.
- An update to an external TinyMCE library to fix a cross-site scripting vulnerability. Reported by Wan Ikram.
- Multiple fixes for cross-site scripting. Reported by Andrea Santese and Rodrigo.
- Avoid disclosing a full file path when a upload fails. Reported by Jakub Galczyk.
------------------------------------------------------------------------------- - ChangeLog:
* Mon Jun 24 2013 Remi Collet <rcollet@redhat.com> - 3.5.2-1 - version 3.5.2, various bug and security fixes: CVE-2013-2173 CVE-2013-2199 CVE-2013-2200 CVE-2013-2201 CVE-2013-2202 CVE-2013-2203 CVE-2013-2204 ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #976784 - CVE-2013-2199 CVE-2013-2200 CVE-2013-2201 CVE-2013-2202 CVE-2013-2203 CVE-2013-2204 CVE-2013-2205 wordpress: Multiple security flaws to be corrected within upstream 3.5.2 version https://bugzilla.redhat.com/show_bug.cgi?id=976784 [ 2 ] Bug #973254 - CVE-2013-2173 wordpress: DoS when computing user-input hash for certain password protected blogs https://bugzilla.redhat.com/show_bug.cgi?id=973254 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update wordpress' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|