Your message dated Sat, 20 Aug 2005 23:47:04 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#323040: fixed in wordpress 1.5.2-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 14 Aug 2005 11:23:02 +0000
>From [EMAIL PROTECTED] Sun Aug 14 04:23:02 2005
Return-path: <[EMAIL PROTECTED]>
Received: from ip0.serverflex.de (vserver151.vserver151.serverflex.de) 
[193.22.164.111] 
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1E4GZy-0007PI-00; Sun, 14 Aug 2005 04:23:02 -0700
Received: from dsl-084-059-167-023.arcor-ip.net ([84.59.167.23] 
helo=localhost.localdomain)
        by vserver151.vserver151.serverflex.de with esmtpsa 
(TLS-1.0:RSA_AES_256_CBC_SHA:32)
        (Exim 4.50)
        id 1E4GZx-0001E0-60
        for [EMAIL PROTECTED]; Sun, 14 Aug 2005 13:23:01 +0200
Received: from jmm by localhost.localdomain with local (Exim 4.52)
        id 1E4GaP-0001Yf-1h; Sun, 14 Aug 2005 13:23:29 +0200
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Moritz Muehlenhoff <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: wordpress: Arbitrary code execution through inproper input sanitising 
in
 cookie handling
X-Mailer: reportbug 3.15
Date: Sun, 14 Aug 2005 13:23:28 +0200
Message-Id: <[EMAIL PROTECTED]>
X-SA-Exim-Connect-IP: 84.59.167.23
X-SA-Exim-Mail-From: [EMAIL PROTECTED]
X-SA-Exim-Scanned: No (on vserver151.vserver151.serverflex.de); SAEximRunCond 
expanded to false
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: wordpress
Severity: grave
Tags: security patch
Justification: user security hole

Hi,
a vulnerability in Wordpress' cookie handling has been reported that allows
arbitrary PHP command execution, if register_globals is enabled in the PHP
config. Please see http://www.securiteam.com/unixfocus/5BP0G00GLK.html

It should be fixed in 1.5.1.4, although I couldn't find this release on the
Wordpress website.

Cheers,
        Moritz

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-rc5
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)

---------------------------------------
Received: (at 323040-close) by bugs.debian.org; 21 Aug 2005 06:50:32 +0000
>From [EMAIL PROTECTED] Sat Aug 20 23:50:32 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
        id 1E6jbk-00049p-00; Sat, 20 Aug 2005 23:47:04 -0700
From: Kai Hendry <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#323040: fixed in wordpress 1.5.2-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Sat, 20 Aug 2005 23:47:04 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: wordpress
Source-Version: 1.5.2-1

We believe that the bug you reported is fixed in the latest version of
wordpress, which is due to be installed in the Debian FTP archive:

wordpress_1.5.2-1.diff.gz
  to pool/main/w/wordpress/wordpress_1.5.2-1.diff.gz
wordpress_1.5.2-1.dsc
  to pool/main/w/wordpress/wordpress_1.5.2-1.dsc
wordpress_1.5.2-1_all.deb
  to pool/main/w/wordpress/wordpress_1.5.2-1_all.deb
wordpress_1.5.2.orig.tar.gz
  to pool/main/w/wordpress/wordpress_1.5.2.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Kai Hendry <[EMAIL PROTECTED]> (supplier of updated wordpress package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri, 19 Aug 2005 10:58:17 +1000
Source: wordpress
Binary: wordpress
Architecture: source all
Version: 1.5.2-1
Distribution: unstable
Urgency: high
Maintainer: Kai Hendry <[EMAIL PROTECTED]>
Changed-By: Kai Hendry <[EMAIL PROTECTED]>
Description: 
 wordpress  - an award winning weblog manager
Closes: 323040
Changes: 
 wordpress (1.5.2-1) unstable; urgency=high
 .
   * New upstream "security fix" release
   * Closes: #323040: CAN-2005-2612
   * See: http://wordpress.org/development/2005/08/one-five-two/
Files: 
 67d3fc919c076569623ae2780f6c851a 564 web optional wordpress_1.5.2-1.dsc
 680e6381c8111f555a2c7066ddafd575 298514 web optional 
wordpress_1.5.2.orig.tar.gz
 09a0b1ed6a5073194aedae4294892b40 7575 web optional wordpress_1.5.2-1.diff.gz
 d0b3587aaf4d2931ce03a0af1c9aea22 303896 web optional wordpress_1.5.2-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDCCHq78o9R9NraMQRAlJWAJ90BYH4CkIe0sZVCfdKS0FcP4+IPwCfXDbg
2P7eGO+Mvl19+ugLQAXZvXY=
=YBP6
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to