Fwd: [Full-disclosure] [ MDVSA-2011:003 ] MHonArc

From: Matteo Beccati <php(at)beccati(dot)com>
To: pgsql-www <pgsql-www(at)postgresql(dot)org>
Subject: Fwd: [Full-disclosure] [ MDVSA-2011:003 ] MHonArc
Date: 2011-01-10 18:04:40
Message-ID: 4D2B4A38.8010607@beccati.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-www

Hi everyone,

FYI, I've seen this passing on full-disclosure and it seems that our
archives are using an affected version of MHonArc.

-------- Messaggio originale --------
Oggetto: [Full-disclosure] [ MDVSA-2011:003 ] MHonArc
Data: Mon, 10 Jan 2011 16:44:01 +0100
Mittente: security(at)mandriva(dot)com
Rispondi-a: xsecurity(at)mandriva(dot)com
A: full-disclosure(at)lists(dot)grok(dot)org(dot)uk

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2011:003
http://www.mandriva.com/security/
_______________________________________________________________________

Package : MHonArc
Date : January 10, 2011
Affected: 2009.0, 2010.0, 2010.1, Corporate 4.0, Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

Multiple vulnerabilities has been found and corrected in MHonArc:

MHonArc 2.6.16 allows remote attackers to cause a denial of service
(CPU consumption) via start tags that are placed within other start
tags, as demonstrated by a
&lt;bo&lt;bo&lt;bo&lt;bo&lt;body&gt;dy&gt;dy&gt;dy&gt;dy&gt; sequence,
a different vulnerability than CVE-2010-4524 (CVE-2010-1677).

Cross-site scripting (XSS) vulnerability in lib/mhtxthtml.pl in
MHonArc 2.6.16 allows remote attackers to inject arbitrary web script
or HTML via a malformed start tag and end tag for a SCRIPT element,
as demonstrated by &lt;scr&lt;body&gt;ipt&gt; and
&lt;/scr&lt;body&gt;ipt&gt; sequences
(CVE-2010-4524).

Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490

The updated packages have been upgraded to the latest version (2.6.18)
which is not vulnerable to these issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1677
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4524
_______________________________________________________________________

Browse pgsql-www by date

  From Date Subject
Next Message Michael Smith 2011-01-13 22:47:58 Correction for the Binary Replication Tutorial
Previous Message David Fetter 2011-01-05 21:15:15 Re: Approval of announce posts