Debian DSA-3402-1 : symfony - security update

high Nessus Plugin ID 87057

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities have been discovered in symfony, a framework to create websites and web applications. The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2015-8124 The RedTeam Pentesting GmbH team discovered a session fixation vulnerability within the 'Remember Me' login feature, allowing an attacker to impersonate the victim towards the web application if the session id value was previously known to the attacker.

- CVE-2015-8125 Several potential remote timing attack vulnerabilities were discovered in classes from the Symfony Security component and in the legacy CSRF implementation from the Symfony Form component.

Solution

Upgrade the symfony packages.

For the stable distribution (jessie), these problems have been fixed in version 2.3.21+dfsg-4+deb8u2.

See Also

https://security-tracker.debian.org/tracker/CVE-2015-8124

https://security-tracker.debian.org/tracker/CVE-2015-8125

https://packages.debian.org/source/jessie/symfony

https://www.debian.org/security/2015/dsa-3402

Plugin Details

Severity: High

ID: 87057

File Name: debian_DSA-3402.nasl

Version: 2.7

Type: local

Agent: unix

Published: 11/25/2015

Updated: 1/11/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:symfony, cpe:/o:debian:debian_linux:8.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 11/24/2015

Reference Information

CVE: CVE-2015-8124, CVE-2015-8125

DSA: 3402