[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2901-2 wordpress -- wordpress

ID: oval:org.secpod.oval:def:601271Date: (C)2014-07-25   (M)2022-10-10
Class: PATCHFamily: unix




The update for wordpress in DSA 2901 caused a regression in the Quick Drafts functionality. This update corrects that problem. For reference, the original advisory text follows. Several vulnerabilities were discovered in Wordpress, a web blogging tool. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2014-0165 A user with a contributor role, using a specially crafted request, can publish posts, which is reserved for users of the next-higher role. CVE-2014-0166 Jon Cave of the WordPress security team discovered that the wp_validate_auth_cookie function in wp-includes/pluggable.php does not properly determine the validity of authentication cookies, allowing a remote attacker to obtain access via a forged cookie.

Platform:
Debian 7.0
Debian 6.0
Product:
wordpress
Reference:
DSA-2901-2
CVE-2014-0165
CVE-2014-0166
CVE    2
CVE-2014-0165
CVE-2014-0166
CPE    101
cpe:/a:wordpress:wordpress:3.0.6
cpe:/a:wordpress:wordpress:3.4.2
cpe:/a:wordpress:wordpress:3.0.5
cpe:/a:wordpress:wordpress:3.4.1
...

© SecPod Technologies