DSA-2113-1 drupal6 -- several vulnerabilities

Related Vulnerabilities: CVE-2010-3091   CVE-2010-3092   CVE-2010-3093   CVE-2010-3094  

Several vulnerabilities have been discovered in Drupal 6 a fully-featured content management framework. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2010-3091 Several issues have been discovered in the OpenID module that allows malicious access to user accounts. CVE-2010-3092 The upload module includes a potential bypass of access restrictions due to not checking letter case-sensitivity. CVE-2010-3093 The comment module has a privilege escalation issue that allows certain users to bypass limitations. CVE-2010-3094 Several cross-site scripting (XSS) issues have been discovered in the Action feature. For the stable distribution (lenny), these problems have been fixed in version 6.6-3lenny6. For the testing distribution (squeeze) and the unstable distribution (sid), these problems have been fixed in version 6.18-1. We recommend that you upgrade your drupal6 packages.

Debian Security Advisory

DSA-2113-1 drupal6 -- several vulnerabilities

Date Reported:
20 Sep 2010
Affected Packages:
drupal6
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 592716.
In Mitre's CVE dictionary: CVE-2010-3091, CVE-2010-3092, CVE-2010-3093, CVE-2010-3094.
More information:

Several vulnerabilities have been discovered in Drupal 6 a fully-featured content management framework. The Common Vulnerabilities and Exposures project identifies the following problems:

  • CVE-2010-3091

    Several issues have been discovered in the OpenID module that allows malicious access to user accounts.

  • CVE-2010-3092

    The upload module includes a potential bypass of access restrictions due to not checking letter case-sensitivity.

  • CVE-2010-3093

    The comment module has a privilege escalation issue that allows certain users to bypass limitations.

  • CVE-2010-3094

    Several cross-site scripting (XSS) issues have been discovered in the Action feature.

For the stable distribution (lenny), these problems have been fixed in version 6.6-3lenny6.

For the testing distribution (squeeze) and the unstable distribution (sid), these problems have been fixed in version 6.18-1.

We recommend that you upgrade your drupal6 packages.

Fixed in:

Debian GNU/Linux 5.0 (lenny)

Source:
http://security.debian.org/pool/updates/main/d/drupal6/drupal6_6.6-3lenny6.dsc
http://security.debian.org/pool/updates/main/d/drupal6/drupal6_6.6-3lenny6.diff.gz
http://security.debian.org/pool/updates/main/d/drupal6/drupal6_6.6.orig.tar.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/d/drupal6/drupal6_6.6-3lenny6_all.deb

MD5 checksums of the listed files are available in the original advisory.