drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in wordpress
Name: |
Mehrere Probleme in wordpress |
|
ID: |
DSA-4401-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian stretch |
|
Datum: |
Fr, 1. März 2019, 08:51 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149 |
|
Applikationen: |
wordpress |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4401-1 security@debian.org https://www.debian.org/security/ Sebastien Delafond March 01, 2019 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : wordpress CVE ID : CVE-2018-20147 CVE-2018-20148 CVE-2018-20149 CVE-2018-20150 CVE-2018-20151 CVE-2018-20152 CVE-2018-20153 CVE-2019-8942 Debian Bug : 916403
Several vulnerabilities were discovered in Wordpress, a web blogging tool. They allowed remote attackers to perform various Cross-Side Scripting (XSS) and PHP injections attacks, delete files, leak potentially sensitive data, create posts of unauthorized types, or cause denial-of-service by application crash.
For the stable distribution (stretch), these problems have been fixed in version 4.7.5+dfsg-2+deb9u5.
We recommend that you upgrade your wordpress packages.
For the detailed security status of wordpress please refer to its security tracker page at: https://security-tracker.debian.org/tracker/wordpress
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlx41ugACgkQEL6Jg/PV nWS2yAgAxfm5TQM+zRiBgU9XSyAnWRCR2pTaAkZkuIggFOiBUa5/QNy8LgG9l2rX fCrymLvKR6c9MP/via6hvB8JW6Hos6KgoSOON2zZ/1XnYawNQFWGkUudkX4QFx/w DIdsBmnVfjTELJYQDJsdfOefngkMFX7vSiaAOf0ya5Qtj5sD4cACork0ngE5Gu8h EGGbataSIhL/C1aisJIvEfWJykvLGjcgd696AKPUiC2dnUdk21CfMYj6YEJQXFBB U+TfkL3aFZHBwIgKH7SkDL1yTpHbSJAGNvPK1vEyOfhIrkK1f2B0Gu4zRyIVnFXW vXhaAeHwJ5TI74RmY+cbw3Hfu7lG1Q== =NCjS -----END PGP SIGNATURE-----
|
|
|
|