Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <idk3fe$gtl$1@dough.gmane.org>
Date: Mon, 06 Dec 2010 19:44:06 -0600
From: Raphael Geissert <geissert@...ian.org>
To: oss-security@...ts.openwall.com
Subject: CVE requests: IO::Socket::SSL, cakephp, collectd, gnash, ocrodjvu, hypermail, libcloud, piwigo

Hi,

Could CVE ids be assigned for the following issues? thanks in advance.

IO::Socket::SSL: unexpected fallback to VERIFY_NONE if certificate file(s) 
are not specified.
http://bugs.debian.org/606058
http://secunia.com/advisories/42508/

cakephp: code execution via unserialize() call with untrusted data
http://malloc.im/CakePHP-unserialize.txt
https://github.com/cakephp/cakephp/commit/e431e86aa4301ced4273dc7919b59362cbb353cb
http://secunia.com/advisories/42211/

collectd: DoS via the RRDtool and RRDCacheD plugins
http://bugs.debian.org/605092
http://secunia.com/advisories/42393/

gnash: insecure handling of temp files at build-time
http://bugs.debian.org/605419
http://secunia.com/advisories/42416/

ocrodjvu: insecure handling of temp files
http://bugs.debian.org/598134

hypermail: XSS
http://bugs.debian.org/598743

libcloud: "doesn't verify ssl certificate"
It appears that what it doesn't verify is the certificate's CN. From the 
references provided in the Debian bug report it looks like it is a 
widespread issue on the SSL implementations in Python.
Not sure how MITRE would like to handle those.

http://bugs.debian.org/598463
https://github.com/tjfontaine/linode-python/issues/issue/1#issue/1

piwigo:
a1) CSRF
a2) SQL injection
a3) stored XSS
http://secunia.com/advisories/41365/
http://piwigo.org/releases/2.1.3
http://www.exploit-db.com/exploits/14973/
(the issues mentioned by the exploit-db entry appear to be the same that 
were fixed in 2.1.3)
b) search.php SQL injection
http://secunia.com/advisories/38305/
http://piwigo.org/releases/2.0.8
c) CSRF in the admin panel:
http://secunia.com/advisories/37681/
http://www.exploit-db.com/exploits/10417
(the exploit-db entry details two other issues, but are "admin-only" -- feel 
free to assign or ignore those.)

Regards,
-- 
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.