FreeBSD : bugzilla -- multiple vulnerabilities (6ad18fe5-f469-11e1-920d-20cf30e32f6d)

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

A Bugzilla Security Advisory reports : The following security issues
have been discovered in Bugzilla : LDAP Injection When the user logs
in using LDAP, the username is not escaped when building the
uid=$username filter which is used to query the LDAP directory. This
could potentially lead to LDAP injection. Directory Browsing
Extensions are not protected against directory browsing and users can
access the source code of the templates which may contain sensitive
data. Directory browsing is blocked in Bugzilla 4.3.3 only, because it
requires a configuration change in the Apache httpd.conf file to allow
local .htaccess files to use Options -Indexes. To not break existing
installations, this fix has not been backported to stable branches.
The access to templates is blocked for all supported branches except
the old 3.6 branch, because this branch doesn't have .htaccess in the
bzr repository and cannot be fixed easily for existing installations
without potentially conflicting with custom changes.

See also :

https://bugzilla.mozilla.org/show_bug.cgi?id=785470
https://bugzilla.mozilla.org/show_bug.cgi?id=785522
https://bugzilla.mozilla.org/show_bug.cgi?id=785511
http://www.nessus.org/u?c93a3f60

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 61764 ()

Bugtraq ID:

CVE ID: CVE-2012-3981

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now