FreeBSD : bugzilla -- multiple vulnerabilities (09c87973-8b9d-11e1-b393-20cf30e32f6d)

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

A Bugzilla Security Advisory reports : The following security issues
have been discovered in Bugzilla : Unauthorized Access Due to a lack
of proper validation of the X-FORWARDED-FOR header of an
authentication request, an attacker could bypass the current lockout
policy used for protection against brute- force password discovery.
This vulnerability can only be exploited if the 'inbound_proxies'
parameter is set. Cross Site Scripting A JavaScript template used by
buglist.cgi could be used by a malicious script to permit an attacker
to gain access to some information about bugs he would not normally be
allowed to see, using the victim's credentials. To be exploitable, the
victim must be logged in when visiting the attacker's malicious page.

All affected installations are encouraged to upgrade as soon as
possible.

See also :

https://bugzilla.mozilla.org/show_bug.cgi?id=728639
https://bugzilla.mozilla.org/show_bug.cgi?id=745397
http://www.nessus.org/u?077999b7

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 58828 ()

Bugtraq ID:

CVE ID: CVE-2012-0465
CVE-2012-0466

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now