![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.66490 |
Category: | Mandrake Local Security Checks |
Title: | Mandriva Security Advisory MDVSA-2009:276-1 (python-django) |
Summary: | The remote host is missing an update to python-django;announced via advisory MDVSA-2009:276-1. |
Description: | Summary: The remote host is missing an update to python-django announced via advisory MDVSA-2009:276-1. Vulnerability Insight: Multiple vulnerabilities has been found and corrected in python-django: The Admin media handler in core/servers/basehttp.py in Django 1.0 and 0.96 does not properly map URL requests to expected static media files, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a crafted URL (CVE-2009-2659). Algorithmic complexity vulnerability in the forms library in Django 1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a crafted (1) EmailField (email address) or (2) URLField (URL) that triggers a large amount of backtracking in a regular expression (CVE-2009-3695). The versions of Django shipping with Mandriva Linux have been updated to the latest patched version that include the fix for this issue. In addition, they provide other bug fixes. Update: Packages for 2008.0 are being provided due to extended support for Corporate products. Affected: 2008.0 Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-2659 BugTraq ID: 35859 http://www.securityfocus.com/bid/35859 https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00055.html https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00069.html http://www.openwall.com/lists/oss-security/2009/07/29/2 http://secunia.com/advisories/36137 http://secunia.com/advisories/36153 Common Vulnerability Exposure (CVE) ID: CVE-2009-3695 BugTraq ID: 36655 http://www.securityfocus.com/bid/36655 Debian Security Information: DSA-1905 (Google Search) http://www.debian.org/security/2009/dsa-1905 http://groups.google.com/group/django-users/browse_thread/thread/15df9e45118dfc51/ http://www.openwall.com/lists/oss-security/2009/10/13/6 http://secunia.com/advisories/36948 http://secunia.com/advisories/36968 http://www.vupen.com/english/advisories/2009/2871 XForce ISS Database: django-emailfield-urlfield-dos(53727) https://exchange.xforce.ibmcloud.com/vulnerabilities/53727 |
Copyright | Copyright (C) 2009 E-Soft Inc. |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |