Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 11 Sep 2008 19:20:08 +0200
From: Hanno Böck <hanno@...eck.de>
To: oss-security@...ts.openwall.com
Cc: coley@...re.org
Subject: CVE request: wordpress < 2.6.2

http://wordpress.org/development/2008/09/wordpress-262/

cite:



Stefan Esser recently warned developers of the dangers of SQL Column 
Truncation and the weakness of mt_rand().  With his help we worked around 
these problems and are now releasing WordPress 2.6.2.  If you allow open 
registration on your blog, you should definitely upgrade.  With open 
registration enabled, it is possible in WordPress versions 2.6.1 and earlier 
to craft a username such that it will allow resetting another user’s password 
to a randomly generated password.  The randomly generated password is not 
disclosed to the attacker, so this problem by itself is annoying but not a 
security exploit.  However, this attack coupled with a weakness in the random 
number seeding in mt_rand() could be used to predict the randomly generated 
password.  Stefan Esser will release details of the complete attack shortly.  
The attack is difficult to accomplish,  but its mere possibility means we 
recommend upgrading to 2.6.2.

-- 
Hanno Böck		Blog:		http://www.hboeck.de/
GPG: 3DBD3B20		Jabber/Mail:	hanno@...eck.de

[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ