Debian DSA-3779-1 : wordpress - security update

critical Nessus Plugin ID 96932

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities were discovered in wordpress, a web blogging tool. They would allow remote attackers to hijack victims' credentials, access sensitive information, execute arbitrary commands, bypass read and post restrictions, or mount denial-of-service attacks.

Solution

Upgrade the wordpress packages.

For the stable distribution (jessie), these problems have been fixed in version 4.1+dfsg-1+deb8u12.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851310

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=852767

https://packages.debian.org/source/jessie/wordpress

https://www.debian.org/security/2017/dsa-3779

Plugin Details

Severity: Critical

ID: 96932

File Name: debian_DSA-3779.nasl

Version: 3.8

Type: local

Agent: unix

Published: 2/2/2017

Updated: 1/11/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:wordpress, cpe:/o:debian:debian_linux:8.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 2/1/2017

Reference Information

CVE: CVE-2017-5488, CVE-2017-5489, CVE-2017-5490, CVE-2017-5491, CVE-2017-5492, CVE-2017-5493, CVE-2017-5610, CVE-2017-5611, CVE-2017-5612

DSA: 3779