Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 6 Jan 2012 18:09:03 +0100
From: Hanno Böck <hanno@...eck.de>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: wordpress plugin timthumb before
 2.0 remote code execution

Am Thu, 03 Nov 2011 09:56:13 -0600
schrieb Kurt Seifried <kseifried@...hat.com>:

> On 11/03/2011 05:23 AM, Hanno Böck wrote:
> > http://markmaunder.com/2011/08/01/zero-day-vulnerability-in-many-wordpress-themes/
> >
> > Seems this never got a CVE. German newspage heise reports lots of
> > hacked wordpress blogs, most likely due to this issue:
> > http://www.heise.de/security/meldung/Tausende-WordPress-Blogs-zur-Verbreitung-von-Schadcode-genutzt-1370660.html
> >
> Yes I remember this one (I actually had a friend's WordPress get
> nailed via this).
> 
> Fix: http://code.google.com/p/timthumb/
> 
> Please use CVE-2011-4106 for this issue.

Mitre site on this is empty till today:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4106

At least a short explanation and the three links would be nice.

-- 
Hanno Böck		mail/jabber: hanno@...eck.de
GPG: BBB51E42		http://www.hboeck.de/

Download attachment "signature.asc" of type "application/pgp-signature" (837 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.