Mandriva Linux Security Advisory : bugzilla (MDVSA-2014:200)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing one or more security
updates.

Description :

Updated bugzilla packages fix security vulnerabilities :

If a new comment was marked private to the insider group, and a flag
was set in the same transaction, the comment would be visible to flag
recipients even if they were not in the insider group (CVE-2014-1571).

An attacker creating a new Bugzilla account can override certain
parameters when finalizing the account creation that can lead to the
user being created with a different email address than originally
requested. The overridden login name could be automatically added to
groups based on the group's regular expression setting
(CVE-2014-1572).

During an audit of the Bugzilla code base, several places were found
where cross-site scripting exploits could occur which could allow an
attacker to access sensitive information (CVE-2014-1573).

See also :

http://advisories.mageia.org/MGASA-2014-0412.html

Solution :

Update the affected bugzilla and / or bugzilla-contrib packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Mandriva Local Security Checks

Nessus Plugin ID: 78616 ()

Bugtraq ID: 70256
70257
70258

CVE ID: CVE-2014-1571
CVE-2014-1572
CVE-2014-1573

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now