How to Buy
This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.
The remote Debian host is missing a security-related update.
Several vulnerabilities were discovered in Bugzilla, a web-based bug
By inserting particular strings into certain URLs, it
was possible to inject both headers and content to any
- CVE-2010-4567, CVE-2011-0048
Bugzilla has a 'URL' field that can contain several
into clickable links, to protect against cross-site
scripting attacks or other attacks. It was possible to
bypass this protection by adding spaces into the URL in
places that Bugzilla did not expect them. Also,
clickable to logged-out users.
It was possible for a user to gain unauthorized access
to any Bugzilla account in a very short amount of time
(short enough that the attack is highly effective).
Various pages were vulnerable to Cross-Site Request
Forgery attacks. Most of these issues are not as serious
as previous CSRF vulnerabilities.
When a user changes his email address, Bugzilla trusts a
user-modifiable field for obtaining the current e-mail
address to send a confirmation message to. If an
attacker has access to the session of another user (for
example, if that user left their browser window open in
a public place), the attacker could alter this field to
cause the email-change notification to go to their own
address. This means that the user would not be notified
that his account had its email address changed by the
For flagmails only, attachment descriptions with a
newline in them could lead to the injection of crafted
headers in email notifications when an attachment flag
Bugzilla uses an alternate host for attachments when
viewing them in raw format to prevent cross-site
scripting attacks. This alternate host is now also used
when viewing patches in 'Raw Unified' mode because
Internet Explorer 8 and older, and Safari before 5.0.6
do content sniffing, which could lead to the execution
of malicious code.
- CVE-2011-2380, CVE-2011-2979
Normally, a group name is confidential and is only
visible to members of the group, and to non-members if
the group is used in bugs. By crafting the URL when
creating or editing a bug, it was possible to guess if a
group existed or not, even for groups which weren't used
in bugs and so which were supposed to remain
See also :
Upgrade the bugzilla packages.
For the oldstable distribution (lenny), it has not been practical to
backport patches to fix these bugs. Users of bugzilla on lenny are
strongly advised to upgrade to the version in the squeeze
For the stable distribution (squeeze), these problems have been fixed
in version 18.104.22.168-4.4.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : true
Family: Debian Local Security Checks
Nessus Plugin ID: 56444 ()
Bugtraq ID: 4598249042
CVE ID: CVE-2010-4567CVE-2010-4568CVE-2010-4572CVE-2011-0046CVE-2011-0048CVE-2011-2379CVE-2011-2380CVE-2011-2381CVE-2011-2978CVE-2011-2979
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.