Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2014.0492
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2014-0492)
Summary:The remote host is missing an update for the 'drupal' package(s) announced via the MGASA-2014-0492 advisory.
Description:Summary:
The remote host is missing an update for the 'drupal' package(s) announced via the MGASA-2014-0492 advisory.

Vulnerability Insight:
Updated drupal packages fix security vulnerability:

Aaron Averill discovered that a specially crafted request can give a user
access to another user's session, allowing an attacker to hijack a random
session (CVE-2014-9015).

Michael Cullum, Javier Nieto and Andres Rojas Guerrero discovered that the
password hashing API allows an attacker to send specially crafted requests
resulting in CPU and memory exhaustion. This may lead to the site becoming
unavailable or unresponsive (denial of service) (CVE-2014-9016).
anonymous users (CVE-2014-9016).

Affected Software/OS:
'drupal' package(s) on Mageia 3, Mageia 4.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-9015
Debian Security Information: DSA-3075 (Google Search)
http://www.debian.org/security/2014/dsa-3075
http://www.openwall.com/lists/oss-security/2014/11/20/3
http://www.openwall.com/lists/oss-security/2014/11/20/21
http://secunia.com/advisories/59164
http://secunia.com/advisories/59814
Common Vulnerability Exposure (CVE) ID: CVE-2014-9016
https://www.drupal.org/node/2378367
http://www.openwall.com/lists/oss-security/2014/11/21/1
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.