oss-sec mailing list archives
Re: CVE request: sympa (try again)
From: Kurt Seifried <kseifried () redhat com>
Date: Tue, 15 May 2012 09:48:49 -0600
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 05/15/2012 09:26 AM, micah anderson wrote:
On Fri, 11 May 2012 23:58:33 -0600, Kurt Seifried <kseifried () redhat com> wrote:Ok I see this one and several more: ================================ 6.1.11 May 11, 2012 Bug fixes: [7358] wwsympa/wwsympa.fcgi.in: Fixing a potential security issue related to archivesThis is the CVE-2012-2352 that you assigned, upstream Sympa has now created a page for security issues, this is one is detailed on there: https://www.sympa.org/security_advisories#security_advisories6.1.1 October 22, 2010 This version includes a lots news such as DKIM support, autosignoff footer link included in lists messages, ... Various vulnerability have been solved in 6.1.1 : cross side scripting, cross-Site request forgeries, brute force attack, DOS. These vulnerabilities were identified with the help of P. Gardenat (Rectorat de Rennes) during a security audit on Sympa. - --------------------- web_tt2/error.tt2, wwsympa/wwsympa.fcgi.in: Now shared document can't be read or edited unless list is open. This is a security fix ================================ 6.0 1st October 2009 Security: - - [reported by T. Retout] SQL injection threat removed by using place holders instead of direct sprint in a query. - - [Submitted by N. Bertrand, univ. Minnesota] Basic logs in debug don't issue the password unencrypted in the logs for function Auth::ldap_authentication. This way, this password won't be sent unencrypted to a possible syslog server. - - [#4439] [#4440] [reported by O.Berger] security vulnerability which use a file in /tmp. - - [#4430] store temporary files in Sympa's own tmp directory instead of /tmp to prevent symlink attacksThese issues were fixed a very long time ago, there was a security advisory in 2010, here is the French CERT advisory for them: http://www.certa.ssi.gouv.fr/site/CERTA-2010-AVI-505/ It appears that besides this most recent CVE, the only CVEs issued for Sympa have been in 2008, so these were not assigned numbers.
Please include links with more direct information (e.g. sympa changelog/code commits).
micah ps - I would sign this message, but it seems like it would be eaten by EZLM :(
- -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBAgAGBQJPsnrhAAoJEBYNRVNeJnmTia8P/0G3Vju/9YtqaNAMKy73pLpk TOfAMRL8ytdVjO7lpp5dXSZlH2wWXCaRQ5ZnrvwIAT/d02hZPlGVbgwqcuE1eZ7o Tqebs/hqA6Upf87XqOdhvTCIqMBlERu3kqJE0jptI33mpJOSjMefEKAotI1yjRiZ MFoSBilklllrFd+tQw5K50XC0ao1d1Gl/TWHs9lqLcgxwRBczi9Bc0gv0G4LSUuK 2VdRpZYEECL1oom/8O6fytZvajAP5obJg4Wixg4ksoawr+lrH8zWypjKs6xHOHVh YwDmP5PwaG3Ez+hj6oU6WUA65P3hElIDZu2J99tdRY3Xh5u/ThZIdsyfet+OuSzz ONBTVGkYU0M9/KAmLe7PpqHB9OWQsAAZbgI40eBB9+uGQwxU93jX0i7qLrF0EA2a u54LWv8YB5KsqB26TirNc7bbXmZzHOvw1Z1wK4wHpxdkGSFJNmjuv/3UshktF6mt I2ajYMYA3rTtsRSmb6eU+tK7ZSb0am4njt1JExGtufjc3Q+AqOkQCCJqt7s6gr+r qbtGko8zhPvHk0hox/NnTtFX9NOioNj9dDTYnoQxCTIZ+can0sQcw8QLoZEVOTFF 8Du3ZhX8gYC5CISFt5n1cJuiJf/YkykrqBvnHVz4bSizr0Wm44yutczHKyQIVJkP 0j8UYQLMHH0vqwqScWO2 =sumu -----END PGP SIGNATURE-----
Current thread:
- CVE request: sympa (try again) micah (May 11)
- ezmlm signature mangling [was: Re: CVE request: sympa (try again)] Daniel Kahn Gillmor (May 11)
- Re: ezmlm signature mangling [was: Re: CVE request: sympa (try again)] Solar Designer (May 12)
- Re: CVE request: sympa (try again) Kurt Seifried (May 11)
- Re: CVE request: sympa (try again) micah anderson (May 12)
- Re: CVE request: sympa (try again) Kurt Seifried (May 12)
- Re: CVE request: sympa (try again) micah anderson (May 15)
- Re: CVE request: sympa (try again) Kurt Seifried (May 15)
- Re: CVE request: sympa (try again) micah anderson (May 12)
- ezmlm signature mangling [was: Re: CVE request: sympa (try again)] Daniel Kahn Gillmor (May 11)