zoneminder: CVE-2016-10140

Related Vulnerabilities: CVE-2016-10140  

Debian Bug report logs - #851710
zoneminder: CVE-2016-10140

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Tue, 17 Jan 2017 20:39:02 UTC

Severity: grave

Tags: patch, security, upstream

Found in version zoneminder/1.30.0+dfsg-2

Fixed in version 1.30.4+dfsg-1

Done: Chris Lamb <lamby@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Dmitry Smirnov <onlyjob@debian.org>:
Bug#851710; Package src:zoneminder. (Tue, 17 Jan 2017 20:39:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Dmitry Smirnov <onlyjob@debian.org>. (Tue, 17 Jan 2017 20:39:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: zoneminder: CVE-2016-10140
Date: Tue, 17 Jan 2017 21:37:46 +0100
Source: zoneminder
Version: 1.30.0+dfsg-2
Severity: important
Tags: security upstream patch

Hi,

the following vulnerability was published for zoneminder.

CVE-2016-10140[0]:
| Information disclosure and authentication bypass vulnerability exists
| in the Apache HTTP Server configuration bundled with ZoneMinder
| v1.30.0, which allows a remote unauthenticated attacker to browse all
| directories in the web root, e.g., a remote unauthenticated attacker
| can view all CCTV images on the server.

The package then installs respectively
/etc/apache2/conf-available/zoneminder.conf with the problematic
settings.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-10140
[1] https://github.com/ZoneMinder/ZoneMinder/pull/1697
[2] https://github.com/ZoneMinder/ZoneMinder/commit/6361f143878ce00659f64ce42593951d773e4e63
[3] https://github.com/ZoneMinder/ZoneMinder/commit/aa0a4d1f5ad2c493f2bed175991e92c466ac3dc4

Regards,
Salvatore



Information forwarded to debian-bugs-dist@lists.debian.org, Dmitry Smirnov <onlyjob@debian.org>:
Bug#851710; Package src:zoneminder. (Wed, 18 Jan 2017 05:15:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Dmitry Smirnov <onlyjob@debian.org>. (Wed, 18 Jan 2017 05:15:03 GMT) (full text, mbox, link).


Message #10 received at 851710@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 851710@bugs.debian.org
Cc: Moritz Muehlenhoff <jmm@debian.org>
Subject: Re: Bug#851710: zoneminder: CVE-2016-10140
Date: Wed, 18 Jan 2017 06:14:01 +0100
Control: severity -1 grave

On Tue, Jan 17, 2017 at 09:37:46PM +0100, Salvatore Bonaccorso wrote:
> Source: zoneminder
> Version: 1.30.0+dfsg-2
> Severity: important
> Tags: security upstream patch
> 
> Hi,
> 
> the following vulnerability was published for zoneminder.
> 
> CVE-2016-10140[0]:
> | Information disclosure and authentication bypass vulnerability exists
> | in the Apache HTTP Server configuration bundled with ZoneMinder
> | v1.30.0, which allows a remote unauthenticated attacker to browse all
> | directories in the web root, e.g., a remote unauthenticated attacker
> | can view all CCTV images on the server.
> 
> The package then installs respectively
> /etc/apache2/conf-available/zoneminder.conf with the problematic
> settings.

After discussing with Moritz Muehlenhoff (jmm), decided to raise the
severity to RC, and have the conffile fix included in stretch.

Regards,
Salvatore



Severity set to 'grave' from 'important' Request was from Salvatore Bonaccorso <carnil@debian.org> to 851710-submit@bugs.debian.org. (Wed, 18 Jan 2017 05:15:03 GMT) (full text, mbox, link).


Added tag(s) pending. Request was from Dmitry Smirnov <onlyjob@member.fsf.org> to control@bugs.debian.org. (Sat, 18 Feb 2017 04:09:02 GMT) (full text, mbox, link).


Message sent on to Salvatore Bonaccorso <carnil@debian.org>:
Bug#851710. (Sat, 18 Feb 2017 04:09:05 GMT) (full text, mbox, link).


Message #17 received at 851710-submitter@bugs.debian.org (full text, mbox, reply):

From: Dmitry Smirnov <onlyjob@member.fsf.org>
To: 851710-submitter@bugs.debian.org
Subject: Bug#851710 tagged as pending
Date: Sat, 18 Feb 2017 04:04:49 +0000
tag 851710 pending
--

We believe that the bug #851710 you reported has been fixed in the Git
repository. You can see the commit message below and/or inspect the
commit contents at:

    http://anonscm.debian.org/cgit/collab-maint/zoneminder.git/diff/?id=7314d05

(This message was generated automatically by
 'git-post-receive-tag-pending-commitmsg' hook).
---
commit 7314d05 (HEAD, master)
Author: Dmitry Smirnov <onlyjob@member.fsf.org>
Date:   Sat Feb 18 04:03:24 2017

    CVE-2016-10140: forbid directory listing in Apache config (Closes: #851710).



Reply sent to Chris Lamb <lamby@debian.org>:
You have taken responsibility. (Mon, 07 Aug 2017 00:42:06 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Mon, 07 Aug 2017 00:42:06 GMT) (full text, mbox, link).


Message #22 received at 851710-done@bugs.debian.org (full text, mbox, reply):

From: Chris Lamb <lamby@debian.org>
To: 851710-done@bugs.debian.org
Cc: Salvatore Bonaccorso <carnil@debian.org>
Subject: Re: zoneminder: CVE-2016-10140
Date: Sun, 06 Aug 2017 20:40:09 -0400
Version: 1.30.4+dfsg-1

Hi,

| Information disclosure and authentication bypass vulnerability exists
| in the Apache HTTP Server configuration bundled with ZoneMinder
| v1.30.0, which allows a remote unauthenticated attacker to browse all
| directories in the web root, e.g., a remote unauthenticated attacker
| can view all CCTV images on the server.

Fix included in 1.30.4+dfsg-1 via upstream.


Regards,

-- 
      ,''`.
     : :'  :     Chris Lamb, Debian Project Leader
     `. `'`      lamby@debian.org / chris-lamb.co.uk
       `-



Information forwarded to debian-bugs-dist@lists.debian.org, Dmitry Smirnov <onlyjob@debian.org>:
Bug#851710; Package src:zoneminder. (Mon, 07 Aug 2017 05:15:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Dmitry Smirnov <onlyjob@debian.org>. (Mon, 07 Aug 2017 05:15:03 GMT) (full text, mbox, link).


Message #27 received at 851710@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Chris Lamb <lamby@debian.org>
Cc: 851710@bugs.debian.org
Subject: Re: zoneminder: CVE-2016-10140
Date: Mon, 7 Aug 2017 07:10:55 +0200
Hi Chris,

On Sun, Aug 06, 2017 at 08:40:09PM -0400, Chris Lamb wrote:
> Version: 1.30.4+dfsg-1
> 
> Hi,
> 
> | Information disclosure and authentication bypass vulnerability exists
> | in the Apache HTTP Server configuration bundled with ZoneMinder
> | v1.30.0, which allows a remote unauthenticated attacker to browse all
> | directories in the web root, e.g., a remote unauthenticated attacker
> | can view all CCTV images on the server.
> 
> Fix included in 1.30.4+dfsg-1 via upstream.

Thanks for the update!

I think I did already update that entry, let me check.

Regards,
Salvatore



Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Wed, 27 Sep 2017 07:25:58 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 15:12:22 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.