Date: Mon, 06 Dec 2010 19:44:06 -0600 From: Raphael Geissert <geissert@...ian.org> To: oss-security@...ts.openwall.com Subject: CVE requests: IO::Socket::SSL, cakephp, collectd, gnash, ocrodjvu, hypermail, libcloud, piwigo Hi, Could CVE ids be assigned for the following issues? thanks in advance. IO::Socket::SSL: unexpected fallback to VERIFY_NONE if certificate file(s) are not specified. http://bugs.debian.org/606058 http://secunia.com/advisories/42508/ cakephp: code execution via unserialize() call with untrusted data http://malloc.im/CakePHP-unserialize.txt https://github.com/cakephp/cakephp/commit/e431e86aa4301ced4273dc7919b59362cbb353cb http://secunia.com/advisories/42211/ collectd: DoS via the RRDtool and RRDCacheD plugins http://bugs.debian.org/605092 http://secunia.com/advisories/42393/ gnash: insecure handling of temp files at build-time http://bugs.debian.org/605419 http://secunia.com/advisories/42416/ ocrodjvu: insecure handling of temp files http://bugs.debian.org/598134 hypermail: XSS http://bugs.debian.org/598743 libcloud: "doesn't verify ssl certificate" It appears that what it doesn't verify is the certificate's CN. From the references provided in the Debian bug report it looks like it is a widespread issue on the SSL implementations in Python. Not sure how MITRE would like to handle those. http://bugs.debian.org/598463 https://github.com/tjfontaine/linode-python/issues/issue/1#issue/1 piwigo: a1) CSRF a2) SQL injection a3) stored XSS http://secunia.com/advisories/41365/ http://piwigo.org/releases/2.1.3 http://www.exploit-db.com/exploits/14973/ (the issues mentioned by the exploit-db entry appear to be the same that were fixed in 2.1.3) b) search.php SQL injection http://secunia.com/advisories/38305/ http://piwigo.org/releases/2.0.8 c) CSRF in the admin panel: http://secunia.com/advisories/37681/ http://www.exploit-db.com/exploits/10417 (the exploit-db entry details two other issues, but are "admin-only" -- feel free to assign or ignore those.) Regards, -- Raphael Geissert - Debian Developer www.debian.org - get.debian.net
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.