FreeBSD : bugzilla -- multiple vulnerabilities (58253655-d82c-11e1-907c-20cf30e32f6d)

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

A Bugzilla Security Advisory reports : The following security issues
have been discovered in Bugzilla : Information Leak Versions: 4.1.1 to
4.2.1, 4.3.1

In HTML bugmails, all bug IDs and attachment IDs are linkified, and
hovering these links displays a tooltip with the bug summary or the
attachment description if the user is allowed to see the bug or
attachment. But when validating user permissions when generating the
email, the permissions of the user who edited the bug were taken into
account instead of the permissions of the addressee. This means that
confidential information could be disclosed to the addressee if the
other user has more privileges than the addressee. Plain text bugmails
are not affected as bug and attachment IDs are not linkified.
Information Leak Versions: 2.17.5 to 3.6.9, 3.7.1 to 4.0.6, 4.1.1 to
4.2.1, 4.3.1

The description of a private attachment could be visible to a user who
hasn't permissions to access this attachment if the attachment ID is
mentioned in a public comment in a bug that the user can see.

See also :

https://bugzilla.mozilla.org/show_bug.cgi?id=777398
https://bugzilla.mozilla.org/show_bug.cgi?id=777586
http://www.nessus.org/u?182938f9

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 60151 ()

Bugtraq ID:

CVE ID: CVE-2012-1968
CVE-2012-1969

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now