FreeBSD : py-django -- denial of service vulnerability (d2c2952d-85a1-11dc-bfff-003048705d5a)

This script is Copyright (C) 2007-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Django project reports :

A per-process cache used by Django's internationalization ('i18n')
system to store the results of translation lookups for particular
values of the HTTP Accept-Language header used the full value of that
header as a key. An attacker could take advantage of this by sending
repeated requests with extremely large strings in the Accept-Language
header, potentially causing a denial of service by filling available
memory.

Due to limitations imposed by Web server software on the size of HTTP
header fields, combined with reasonable limits on the number of
requests which may be handled by a single server process over its
lifetime, this vulnerability may be difficult to exploit.
Additionally, it is only present when the 'USE_I18N' setting in Django
is 'True' and the i18n middleware component is enabled*. Nonetheless,
all users of affected versions of Django are encouraged to update.

See also :

http://www.djangoproject.com/weblog/2007/oct/26/security-fix/
http://www.nessus.org/u?eacca22d

Solution :

Update the affected packages.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 27588 (freebsd_pkg_d2c2952d85a111dcbfff003048705d5a.nasl)

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now