copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2014.0883 - [Win][UNIX/Linux][Debian] python-bottle: Unauthorised access - Remote/unauthenticated

Date: 05 June 2014

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.0883
                       python-bottle security update
                                5 June 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           python-bottle
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Unauthorised Access -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-3137  

Original Bulletin: 
   http://www.debian.org/security/2014/dsa-2948

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running python-bottle check for an updated version of the software 
         for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-2948-1                   security@debian.org
http://www.debian.org/security/                        Moritz Muehlenhoff
June 04, 2014                          http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : python-bottle
CVE ID         : CVE-2014-3137

It was discovered that Bottle, a WSGI-framework for Python, performed
a too permissive detection of JSON content, resulting a potential
bypass of security mechanisms.

For the stable distribution (wheezy), this problem has been fixed in
version 0.10.11-1+deb7u1.

For the testing distribution (jessie), this problem has been fixed in
version 0.12.6-1.

For the unstable distribution (sid), this problem has been fixed in
version 0.12.6-1.

We recommend that you upgrade your python-bottle packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBAgAGBQJTj0HbAAoJEBDCk7bDfE425ToQAKVd+qzgQWMPgKahLtlDz9fF
yAN5GG6HcxT9G5TGmTOQ2kundqezmJw2Y/slO8tBJsh8YJDuGXLwqcbpbVj9kLXb
X+oYPzARSUUy/HOpVXuD0cy/7713typ85cFC4j2IONl+uqLc1rFD8EikIc1MZQg2
yYKCb/PvE3wwS2Ctko2ODsTTO2VDjzl4Qr14dZUJokbJD6mr0MfxF7ijeygcpLaL
wSh6KF6fNnfBEVQg1YBn4ejTy4Ay7QXbaY42LpBMAl7C5FwnC9WI/hudS6SSmwUY
OJE2kh7fq/B8wQgdkHh61Sm12oYMSAVdWn4bGumb2Hq/I462ED47fnkfJtfIN0fq
Gswamw3eDInibZ36GeB8BG4FmCiCzQxbslmX/gJLojAFTjEIjjIT/s3YiApBPdbc
AP1w4ji2QanqhKZB9Al8xLJB7lK25XXiC/0n1rKQz8ZYW3lIgFpoy8jXWxQa+IYp
1oCS2+3Zyuub7Y6siiG6OnYEB8SbY6hP08e/igotCPSXLhhDtkCaI8VJud7U8/Ug
Ta99ZqtUVMEEije7Q/FjQqD7eyulr1N9gs/71NTkzZCMkKDcShR/eT9P6AB44hXC
CDmFYFpnBPRDjsP5kTOem/nl1iacivZ4FpS5vy+VaRlE2BDYSc6LfXlcBBZT7jp5
TupqBW30QP5WGjICLw72
=MKdR
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=1IuG
-----END PGP SIGNATURE-----