SCIENTIFIC-LINUX-ERRATA Archives

October 2014

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Bonnie King <[log in to unmask]>
Reply To:
Date:
Mon, 13 Oct 2014 15:44:25 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (88 lines)
Synopsis:          Moderate: conga security and bug fix update
Advisory ID:       SLSA-2014:1194-1
Issue Date:        2014-09-16
CVE Numbers:       CVE-2012-5500
                   CVE-2012-5499
                   CVE-2012-5498
                   CVE-2012-5497
                   CVE-2012-5485
                   CVE-2012-5486
                   CVE-2012-5488
                   CVE-2013-6496
                   CVE-2014-3521
--

It was discovered that Plone, included as a part of luci, did not properly
protect the administrator interface (control panel). A remote attacker
could use this flaw to inject a specially crafted Python statement or
script into Plone's restricted Python sandbox that, when the administrator
interface was accessed, would be executed with the privileges of that
administrator user. (CVE-2012-5485)

It was discovered that Plone, included as a part of luci, did not properly
sanitize HTTP headers provided within certain URL requests. A remote
attacker could use a specially crafted URL that, when processed, would
cause the injected HTTP headers to be returned as a part of the Plone HTTP
response, potentially allowing the attacker to perform other more advanced
attacks. (CVE-2012-5486)

Multiple information leak flaws were found in the way conga processed luci
site extension-related URL requests. A remote, unauthenticated attacker
could issue a specially crafted HTTP request that, when processed, would
result in unauthorized information disclosure. (CVE-2013-6496)

It was discovered that various components in the luci site extension-
related URLs were not properly restricted to administrative users. A
remote, authenticated attacker could escalate their privileges to perform
certain actions that should be restricted to administrative users, such as
adding users and systems, and viewing log data. (CVE-2014-3521)

It was discovered that Plone, included as a part of luci, did not properly
protect the privilege of running RestrictedPython scripts. A remote
attacker could use a specially crafted URL that, when processed, would
allow the attacker to submit and perform expensive computations or, in
conjunction with other attacks, be able to access or alter privileged
information. (CVE-2012-5488)

It was discovered that Plone, included as a part of luci, did not properly
enforce permissions checks on the membership database. A remote attacker
could use a specially crafted URL that, when processed, could allow the
attacker to enumerate user account names. (CVE-2012-5497)

It was discovered that Plone, included as a part of luci, did not properly
handle the processing of requests for certain collections. A remote
attacker could use a specially crafted URL that, when processed, would
lead to excessive I/O and/or cache resource consumption. (CVE-2012-5498)

It was discovered that Plone, included as a part of luci, did not properly
handle the processing of very large values passed to an internal utility
function. A remote attacker could use a specially crafted URL that, when
processed, would lead to excessive memory consumption. (CVE-2012-5499)

It was discovered that Plone, included as a part of luci, allowed a remote
anonymous user to change titles of content items due to improper
permissions checks. (CVE-2012-5500)

The CVE-2014-3521 issue was discovered by Radek Steiger of Red Hat, and
the CVE-2013-6496 issue was discovered by Jan Pokorny of Red Hat.

Users are directed to the Scientific Linux 5.11 Technical Notes, linked to
in the References section, for information on the most significant of
these changes

After installing this update, the luci and ricci services will be
restarted automatically.
--

SL5
  x86_64
    conga-debuginfo-0.12.2-81.el5.x86_64.rpm
    luci-0.12.2-81.el5.x86_64.rpm
    ricci-0.12.2-81.el5.x86_64.rpm
  i386
    conga-debuginfo-0.12.2-81.el5.i386.rpm
    luci-0.12.2-81.el5.i386.rpm
    ricci-0.12.2-81.el5.i386.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2