Summary
The remote host is missing an update to wordpress
announced via advisory DSA 1871-2.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201871-2
Insight
The previous wordpress update introduced a regression when fixing CVE-2008-4769 due to a function that was not backported with the patch.
Please note that this regression only affects the oldstable distribution (etch). For reference the original advisory text follows.
Several vulnerabilities have been discovered in wordpress, weblog manager. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2008-6762
It was discovered that wordpress is prone to an open redirect vulnerability which allows remote attackers to conduct phishing atacks.
CVE-2008-6767
It was discovered that remote attackers had the ability to trigger an application upgrade, which could lead to a denial of service attack.
CVE-2009-2334
It was discovered that wordpress lacks authentication checks in the plugin configuration, which might leak sensitive information.
CVE-2009-2854
It was discovered that wordpress lacks authentication checks in various actions, thus allowing remote attackers to produce unauthorised edits or additions.
CVE-2009-2851
It was discovered that the administrator interface is prone to a cross-site scripting attack.
CVE-2009-2853
It was discovered that remote attackers can gain privileges via certain direct requests.
CVE-2008-1502
It was discovered that the _bad_protocol_once function in KSES, as used by wordpress, allows remote attackers to perform cross-site scripting attacks.
CVE-2008-4106
It was discovered that wordpress lacks certain checks around user information, which could be used by attackers to change the password of a user.
CVE-2008-4769
It was discovered that the get_category_template function is prone to a directory traversal vulnerability, which could lead to the execution of arbitrary code.
CVE-2008-4796
It was discovered that the _httpsrequest function in the embedded snoopy version is prone to the execution of arbitrary commands via shell metacharacters in https URLs.
CVE-2008-5113
It was discovered that wordpress relies on the REQUEST superglobal array in certain dangerous situations, which makes it easier to perform attacks via crafted cookies.
For the stable distribution (lenny), these problems have been fixed in version 2.5.1-11+lenny1.
For the oldstable distribution (etch), these problems have been fixed in version 2.0.10-1etch5.
For the testing distribution (squeeze) and the unstable distribution (sid), these problems have been fixed in version 2.8.3-1.
We recommend that you upgrade your wordpress packages.
Severity
Classification
-
CVE CVE-2008-1502, CVE-2008-4106, CVE-2008-4769, CVE-2008-4796, CVE-2008-5113, CVE-2008-6762, CVE-2008-6767, CVE-2009-2334, CVE-2009-2851, CVE-2009-2853, CVE-2009-2854 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities