English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 102521 CVE descriptions
and 54701 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2008-9213
2008-10-30 11:39:59
--------------------------------------------------------------------------------

Name        : drupal
Product     : Fedora 9
Version     : 6.6
Release     : 1.fc9
URL         : http://www.drupal.org
Summary     : An open-source content-management platform
Description :
Equipped with a powerful blend of features, Drupal is a Content Management
System written in PHP that can support a variety of websites ranging from
personal weblogs to large community-driven websites.  Drupal is highly
configurable, skinnable, and secure.

--------------------------------------------------------------------------------
Update Information:

Update to 6.6, security fixes:    SA-2008-067 ( http://drupal.org/node/324824 )
------------DESCRIPTION------------    Multiple vulnerabilities and weaknesses
were discovered in Drupal.    ------------FILE INCLUSION------------    On a
server configured for IP-based virtual hosts, Drupal may be caused to  include
and execute specifically named files outside of its root directory.     This bug
affects both Drupal 5 and Drupal 6.    ------------CROSS SITE
SCRIPTING------------    The title of book pages is not always properly escaped,
enabling users with the  "create book content" permission or the permission to
edit any node in the book  hierarchy to insert arbitrary HTML and script code
into pages. Such a Cross site  scripting [ http://en.wikipedia.org/wiki/Cross-
site_scripting ] attack may lead  to the attacker gaining administrator access.
This bug affects Drupal 6.      Remember to log in to your site as the admin
user before upgrading this package. After upgrading the package, browse to
http://host/drupal/update.php to run the upgrade script.
--------------------------------------------------------------------------------
ChangeLog:

* Wed Oct 22 2008 Jon Ciesla <limb@jcomserv.net> - 6.6-1
- Upgrade to 6.6, SA-2008-067.
* Thu Oct  9 2008 Jon Ciesla <limb@jcomserv.net> - 6.5-1
- Upgrade to 6.5, SA-2008-060.
- Added notes to README and drupal.conf re CVE-2008-3661.
* Thu Aug 14 2008 Jon Ciesla <limb@jcomserv.net> - 6.4-1
- Upgrade to 6.4, SA-2008-047.
* Thu Jul 10 2008 Jon Ciesla <limb@jcomserv.net> - 6.3-1
- Upgrade to 6.3, upstream security fixes, SA-2008-044.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #468422 - drupal: File inclusion, XSS vulnerability (SA-2008-067)
        https://bugzilla.redhat.com/show_bug.cgi?id=468422
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update drupal' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------

_______________________________________________
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2017 E-Soft Inc. All rights reserved.