Your message dated Sun, 14 Mar 2010 01:52:43 +0000
with message-id <e1nqd0v-00049n...@ries.debian.org>
and subject line Bug#572439: fixed in drupal6 6.6-3lenny5
has caused the Debian Bug report #572439,
regarding SA-CORE-2010-001 - Drupal core - Multiple     vulnerabilities
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
572439: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=572439
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
package: drupal6
severity: critical
tags: security

  * Advisory ID: DRUPAL-SA-CORE-2010-001
  * Project: Drupal core
  * Version: 5.x, 6.x
  * Date: 2010-March-03
  * Security risk: Critical
  * Exploitable from: Remote
  * Vulnerability: Multiple vulnerabilities

-------- DESCRIPTION
---------------------------------------------------------

Multiple vulnerabilities and weaknesses were discovered in Drupal.
.... Installation cross site scripting

A user-supplied value is directly output during installation allowing a
malicious user to craft a URL and perform a cross-site scripting attack. The
exploit can only be conducted on sites not yet installed. This issue affects
Drupal 6.x only.
.... Open redirection

The API function drupal_goto() is susceptible to a phishing attack. An
attacker could formulate a redirect in a way that gets the Drupal site to
send the user to an arbitrarily provided URL. No user submitted data will be
sent to that URL. This issue affects Drupal 5.x and 6.x.
.... Locale module cross site scripting

Locale module and dependent contributed modules do not sanitize the display
of language codes, native and English language names properly. While these
usually come from a preselected list, arbitrary administrator input is
allowed. This vulnerability is mitigated by the fact that the attacker must
have a role with the 'administer languages' permission. This issue affects
Drupal 5.x and 6.x.
.... Blocked user session regeneration

Under certain circumstances, a user with an open session that is blocked can
maintain his/her session on the Drupal site, despite being blocked. This
issue affects Drupal 5.x and 6.x.
-------- VERSIONS AFFECTED
---------------------------------------------------

  * Drupal 6.x before version 6.16.
  * Drupal 5.x before version 5.22.

-------- SOLUTION
------------------------------------------------------------

Install the latest version:
  * If you are running Drupal 6.x then upgrade to Drupal 6.16 [1].
  * If you are running Drupal 5.x then upgrade to Drupal 5.22 [2].

Drupal 5 will no longer be maintained when Drupal 7 is released [3].
Upgrading to Drupal 6 [4] is recommended. If you are unable to upgrade
immediately, you can apply a patch to secure your installation until you are
able to do a proper upgrade. These patches fix the security vulnerabilities,
but do not contain other fixes which were released in Drupal 6.16 or Drupal
5.22.
  * To patch Drupal 6.15 use SA-CORE-2010-001-6.15.patch [5].
  * To patch Drupal 5.21 use SA-CORE-2010-001-5.21.patch [6].

-------- REPORTED BY
---------------------------------------------------------

The installation cross site scripting issue was reported by David Rothstein
[7] (*). The open redirection was reported by Martin Barbella [8]. The locale
module cross site scripting was reported by Justin Klein Keane [9]. The
blocked user session regeneration issue was reported by Craig A. Hancock
[10]. (*) Member of the Drupal security team.
-------- FIXED BY
------------------------------------------------------------

The installation cross site scripting issue was fixed by Heine Deelstra [11].
The open redirection was fixed by Gerhard Killesreiter [12] and Heine
Deelstra [13]. The locale module cross site scripting was fixed by Stéphane
Corlosquet [14], Peter Wolanin [15], Heine Deelstra [16] and Neil Drumm [17].
The blocked user session regeneration issue was fixed by Gerhard Killesreiter
[18]. All the fixes were done by members of the Drupal security team.
-------- CONTACT
-------------------------------------------------------------

The security team for Drupal can be reached at security at drupal.org or via
the form at http://drupal.org/contact.

[1] http://ftp.drupal.org/files/projects/drupal-6.16.tar.gz
[2] http://ftp.drupal.org/files/projects/drupal-5.22.tar.gz
[3] http://drupal.org/node/725382
[4] http://drupal.org/upgrade
[5] http://drupal.org/files/sa-core-2010-001/SA-CORE-2010-001-6.15.patch
[6] http://drupal.org/files/sa-core-2010-001/SA-CORE-2010-001-5.21.patch
[7] http://drupal.org/user/124982
[8] http://drupal.org/user/633600
[9] http://drupal.org/user/302225
[10] http://drupal.org/user/62850
[11] http://drupal.org/user/17943
[12] http://drupal.org/user/227
[13] http://drupal.org/user/17943
[14] http://drupal.org/user/52142
[15] http://drupal.org/user/49851
[16] http://drupal.org/user/17943
[17] http://drupal.org/user/3064
[18] http://drupal.org/user/227

_______________________________________________
Security-news mailing list
security-n...@drupal.org
http://lists.drupal.org/mailman/listinfo/security-news



--- End Message ---
--- Begin Message ---
Source: drupal6
Source-Version: 6.6-3lenny5

We believe that the bug you reported is fixed in the latest version of
drupal6, which is due to be installed in the Debian FTP archive:

drupal6_6.6-3lenny5.diff.gz
  to main/d/drupal6/drupal6_6.6-3lenny5.diff.gz
drupal6_6.6-3lenny5.dsc
  to main/d/drupal6/drupal6_6.6-3lenny5.dsc
drupal6_6.6-3lenny5_all.deb
  to main/d/drupal6/drupal6_6.6-3lenny5_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 572...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Luigi Gangitano <lu...@debian.org> (supplier of updated drupal6 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Fri, 12 Mar 2010 14:43:38 +0100
Source: drupal6
Binary: drupal6
Architecture: source all
Version: 6.6-3lenny5
Distribution: stable-security
Urgency: high
Maintainer: Luigi Gangitano <lu...@debian.org>
Changed-By: Luigi Gangitano <lu...@debian.org>
Description: 
 drupal6    - a fully-featured content management framework
Closes: 572439
Changes: 
 drupal6 (6.6-3lenny5) stable-security; urgency=high
 .
   [ Luigi Gangitano ]
   * debian/patches/19_SA-CORE-2010-001
     - Fixes multiple XSS vulnerabilities (Closes: #572439)
       (Ref: SA-CORE-2010-001, CVE-TBA)
Checksums-Sha1: 
 290fc76609810cf46228ab396dba906a6a006b5e 1130 drupal6_6.6-3lenny5.dsc
 fbd3e6994eb535a4fedb47c9f67f1e4cbd5ec134 27774 drupal6_6.6-3lenny5.diff.gz
 f63e6697d20d43598652ca58e975dc4888135966 1090960 drupal6_6.6-3lenny5_all.deb
Checksums-Sha256: 
 d1aa786d2082eba7d5b8e44b56e79ddf19f8b8f119acb5fa843bdbd853bb3046 1130 
drupal6_6.6-3lenny5.dsc
 0b5aa05f224676ce6975194029e6bf2969249ad7e91e36b207b9f44c7462d427 27774 
drupal6_6.6-3lenny5.diff.gz
 13af5273bc8132d5654faf5b1ab5cafbc2e6944ad97f3e8c6b68acebdb70f234 1090960 
drupal6_6.6-3lenny5_all.deb
Files: 
 c9a38beb62cb13b3da19ecf47b7ce45b 1130 web extra drupal6_6.6-3lenny5.dsc
 5729f8478c82576cfc74c4f78e1eb650 27774 web extra drupal6_6.6-3lenny5.diff.gz
 ec52242f1cad13d4553f684202063bc9 1090960 web extra drupal6_6.6-3lenny5_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (Darwin)

iEYEARECAAYFAkubYWAACgkQ8ZumGJJMDCbpeACfWAxCVCGOxZNbP15CRUJ6zawx
xekAnAyXQodeQyn/8RJG6HqU+v8fZuAZ
=Od2a
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to