Gentoo Archives: gentoo-announce

From: Sune Kloppenborg Jeppesen <jaervosz@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200606-08 ] WordPress: Arbitrary command execution
Date: Fri, 09 Jun 2006 21:48:14
Message-Id: 200606092311.03672.jaervosz@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200606-08
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: WordPress: Arbitrary command execution
9 Date: June 09, 2006
10 Bugs: #134397
11 ID: 200606-08
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 WordPress fails to sufficiently check the format of cached username
19 data.
20
21 Background
22 ==========
23
24 WordPress is a PHP and MySQL based content management and publishing
25 system.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 www-apps/wordpress < 2.0.3 >= 2.0.3
34
35 Description
36 ===========
37
38 rgod discovered that WordPress insufficiently checks the format of
39 cached username data.
40
41 Impact
42 ======
43
44 An attacker could exploit this vulnerability to execute arbitrary
45 commands by sending a specially crafted username. As of Wordpress 2.0.2
46 the user data cache is disabled as the default.
47
48 Workaround
49 ==========
50
51 There are no known workarounds at this time.
52
53 Resolution
54 ==========
55
56 All WordPress users should upgrade to the latest available version:
57
58 # emerge --sync
59 # emerge --ask --oneshot --verbose ">=www-apps/wordpress-2.0.3"
60
61 References
62 ==========
63
64 [ 1 ] CVE-2006-2667
65 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2667
66 [ 2 ] CVE-2006-2702
67 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2702
68
69 Availability
70 ============
71
72 This GLSA and any updates to it are available for viewing at
73 the Gentoo Security Website:
74
75 http://security.gentoo.org/glsa/glsa-200606-08.xml
76
77 Concerns?
78 =========
79
80 Security is a primary focus of Gentoo Linux and ensuring the
81 confidentiality and security of our users machines is of utmost
82 importance to us. Any security concerns should be addressed to
83 security@g.o or alternatively, you may file a bug at
84 http://bugs.gentoo.org.
85
86 License
87 =======
88
89 Copyright 2006 Gentoo Foundation, Inc; referenced text
90 belongs to its owner(s).
91
92 The contents of this document are licensed under the
93 Creative Commons - Attribution / Share Alike license.
94
95 http://creativecommons.org/licenses/by-sa/2.5