Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 03 Nov 2011 09:56:13 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: wordpress plugin timthumb before
 2.0 remote code execution

On 11/03/2011 05:23 AM, Hanno Böck wrote:
> http://markmaunder.com/2011/08/01/zero-day-vulnerability-in-many-wordpress-themes/
>
> Seems this never got a CVE. German newspage heise reports lots of
> hacked wordpress blogs, most likely due to this issue:
> http://www.heise.de/security/meldung/Tausende-WordPress-Blogs-zur-Verbreitung-von-Schadcode-genutzt-1370660.html
>
Yes I remember this one (I actually had a friend's WordPress get nailed
via this).

Fix: http://code.google.com/p/timthumb/

Please use CVE-2011-4106 for this issue.

-- 

-Kurt Seifried / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ