Fedora 11 : Django-1.1.1-1.fc11 (2009-10390)

This script is Copyright (C) 2009-2015 Tenable Network Security, Inc.

Synopsis :

The remote Fedora host is missing a security update.

Description :

http://www.djangoproject.com/weblog/2009/oct/09/security/ Description
of vulnerability ============================ Django's forms library
included field types which perform regular-expression-based validation
of email addresses and URLs. Certain addresses/URLs could trigger a
pathological performance case in this regular expression, resulting in
the server process/thread becoming unresponsive, and consuming
excessive CPU over an extended period of time. If deliberately
triggered, this could result in an effective denial-of-service attack.

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :


Solution :

Update the affected Django package.

Risk factor :


Family: Fedora Local Security Checks

Nessus Plugin ID: 42152 (fedora_2009-10390.nasl)

Bugtraq ID:


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now