Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 26 Feb 2018 10:40:54 +0530
From: Sahil Dhar <sdhar@...urityinnovation.com>
To: Maxim Solodovnik <solomax@...che.org>
Cc: security@...nmeetings.apache.org, 
	Openmeetings user-list <user@...nmeetings.apache.org>, dev <dev@...nmeetings.apache.org>, 
	user-russian@...nmeetings.apache.org, Sahil <sdhar@...urityinnovation.com>, 
	oss-security@...ts.openwall.com
Subject: Re: [ANNOUNCE] CVE-2018-1286 - Apache OpenMeetings - Insufficient
 Access Controls

Hi Maxim,


I just noticed that there is a typo in the CVE-2018-1286 description, as it
states that the affected version is 3.0.0. However, the vulnerability was
reported for 4.0.1 release. Can you please update it?

Thanks,
~ Sahil






On Sun, Feb 25, 2018 at 5:20 PM, Maxim Solodovnik <solomax@...che.org>
wrote:

> Severity: Medium
>
> Vendor: The Apache Software Foundation
>
> Versions Affected: Apache OpenMeetings 3.0.0
>
> Description: CRUD operations on privileged users are not password
> protected allowing an authenticated attacker to deny service for
> privileged users.
>
>
> The issue was fixed in 4.0.2
> All users are recommended to upgrade to Apache OpenMeetings 4.0.2
>
> Credit: This issue was identified by Sahil Dhar of Security Innovation Inc
>

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ