Mandriva Linux Security Advisory : python-django (MDVSA-2009:276-1)

This script is Copyright (C) 2009-2015 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing a security update.

Description :

Multiple vulnerabilities has been found and corrected in
python-django :

The Admin media handler in core/servers/basehttp.py in Django 1.0 and
0.96 does not properly map URL requests to expected static media
files, which allows remote attackers to conduct directory traversal
attacks and read arbitrary files via a crafted URL (CVE-2009-2659).

Algorithmic complexity vulnerability in the forms library in Django
1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause
a denial of service (CPU consumption) via a crafted (1) EmailField
(email address) or (2) URLField (URL) that triggers a large amount of
backtracking in a regular expression (CVE-2009-3695).

The versions of Django shipping with Mandriva Linux have been updated
to the latest patched version that include the fix for this issue. In
addition, they provide other bug fixes.

Update :

Packages for 2008.0 are provided for Corporate Desktop 2008.0
customers

See also :

http://www.djangoproject.com/weblog/2009/jul/28/security/
http://www.djangoproject.com/weblog/2009/oct/09/security/

Solution :

Update the affected python-django package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Mandriva Local Security Checks

Nessus Plugin ID: 42131 (mandriva_MDVSA-2009-276.nasl)

Bugtraq ID: 35859

CVE ID: CVE-2009-2659
CVE-2009-3695

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now