ESB-2018.2842 - [UNIX/Linux][Debian] mediawiki: Multiple vulnerabilities 2018-09-24

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.2842
                         mediawiki security update
                             24 September 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           mediawiki
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Reduced Security         -- Remote/Unauthenticated
                   Access Confidential Data -- Existing Account      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-0505 CVE-2018-0504 CVE-2018-0503

Original Bulletin: 
   http://www.debian.org/security/2018/dsa-4301

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running mediawiki check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4301-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
September 22, 2018                    https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : mediawiki
CVE ID         : CVE-2018-0503 CVE-2018-0504 CVE-2018-0505

Multiple security vulnerabilities have been discovered in MediaWiki, a
website engine for collaborative work, which result in incorrectly
configured rate limits, information disclosure in Special:Redirect/logid
and bypass of an account lock.

For the stable distribution (stretch), these problems have been fixed in
version 1:1.27.5-1~deb9u1.

We recommend that you upgrade your mediawiki packages.

For the detailed security status of mediawiki please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/mediawiki

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=Q4d3
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=EsoU
-----END PGP SIGNATURE-----

« Back to bulletins