Fedora 10 : Django-1.1.1-1.fc10 (2009-10432)

This script is Copyright (C) 2009-2015 Tenable Network Security, Inc.


Synopsis :

The remote Fedora host is missing a security update.

Description :

http://www.djangoproject.com/weblog/2009/oct/09/security/ Description
of vulnerability ============================ Django's forms library
included field types which perform regular-expression-based validation
of email addresses and URLs. Certain addresses/URLs could trigger a
pathological performance case in this regular expression, resulting in
the server process/thread becoming unresponsive, and consuming
excessive CPU over an extended period of time. If deliberately
triggered, this could result in an effective denial-of-service attack.

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://www.djangoproject.com/weblog/2009/oct/09/security/
https://bugzilla.redhat.com/show_bug.cgi?id=528246
http://www.nessus.org/u?1d1d5559

Solution :

Update the affected Django package.

Risk factor :

High

Family: Fedora Local Security Checks

Nessus Plugin ID: 42153 (fedora_2009-10432.nasl)

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now