Get a Pentest and security assessment of your IT network.

Advisories

Mandriva Linux Security Advisory 2009-276

Mandriva Linux Security Advisory 2009-276 – The Admin media handler in core/servers/basehttp.py in Django 1.0 and 0.96 does not properly map URL requests to expected static media files, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a crafted URL. Algorithmic complexity vulnerability in the forms library in Django 1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a crafted (1) EmailField (email address) or (2) URLField (URL) that triggers a large amount of backtracking in a regular expression. The versions of Django shipping with Mandriva Linux have been updated to the latest patched version that include the fix for this issue. In addition, they provide other bug fixes.

 

You can download this advisory from the following link: https://packetstormsecurity.com/files/download/81967/MDVSA-2009-276.txt

Source: https://packetstormsecurity.com/files/81967/Mandriva-Linux-Security-Advisory-2009-276.html

Related posts
Advisories

Secunia Security Advisory 15646

Advisories

Secunia Security Advisory 18761

Advisories

deluxeBBflaws.txt

Advisories

Mandriva Linux Security Advisory 2007.061