blob: ddf5f922495ef0dd56df8beee3514ef0ce000658 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
|
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200811-02">
<title>Gallery: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities in Gallery may lead to execution of arbitrary
code, disclosure of local files or theft of user's credentials.
</synopsis>
<product type="ebuild">gallery</product>
<announced>2008-11-09</announced>
<revised>2009-05-28: 02</revised>
<bug>234137</bug>
<bug>238113</bug>
<access>remote</access>
<affected>
<package name="www-apps/gallery" auto="yes" arch="*">
<unaffected range="ge">2.2.6</unaffected>
<unaffected range="rge">1.5.9</unaffected>
<unaffected range="rge">1.5.10</unaffected>
<vulnerable range="lt">2.2.6</vulnerable>
</package>
</affected>
<background>
<p>
Gallery is an open source web based photo album organizer.
</p>
</background>
<description>
<p>
Multiple vulnerabilities have been discovered in Gallery 1 and 2:
</p>
<ul>
<li>
Digital Security Research Group reported a directory traversal
vulnerability in contrib/phpBB2/modules.php in Gallery 1, when
register_globals is enabled (CVE-2008-3600).
</li>
<li>
Hanno Boeck reported that Gallery 1 and 2 did not set the secure flag
for the session cookie in an HTTPS session (CVE-2008-3662).
</li>
<li>
Alex Ustinov reported that Gallery 1 and 2 does not properly handle ZIP
archives containing symbolic links (CVE-2008-4129).
</li>
<li>
The vendor reported a Cross-Site Scripting vulnerability in Gallery 2
(CVE-2008-4130).
</li>
</ul>
</description>
<impact type="normal">
<p>
Remote attackers could send specially crafted requests to a server
running Gallery, allowing for the execution of arbitrary code when
register_globals is enabled, or read arbitrary files via directory
traversals otherwise. Attackers could also entice users to visit
crafted links allowing for theft of login credentials.
</p>
</impact>
<workaround>
<p>
There is no known workaround at this time.
</p>
</workaround>
<resolution>
<p>
All Gallery 2 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/gallery-2.2.6"</code>
<p>
All Gallery 1 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/gallery-1.5.9"</code>
</resolution>
<references>
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3600">CVE-2008-3600</uri>
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3662">CVE-2008-3662</uri>
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4129">CVE-2008-4129</uri>
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4130">CVE-2008-4130</uri>
</references>
<metadata tag="requester" timestamp="2008-10-18T20:31:05Z">
keytoaster
</metadata>
<metadata tag="submitter" timestamp="2008-10-21T20:22:34Z">
keytoaster
</metadata>
<metadata tag="bugReady" timestamp="2008-10-31T00:12:12Z">
rbu
</metadata>
</glsa>
|