Articles / Debian: New wordpress packa…

Debian: New wordpress packages fix several vulnerabilities

Several remote vulnerabilities have been discovered in wordpress, a weblog manager. Insufficient input sanitising allowed for remote attackers to redirect visitors to external websites. Multiple cross-site scripting vulnerabilities allowed remote authenticated administrators to inject arbitrary web script or HTML. SQL injection vulnerability allowed allowed remote authenticated administrators to execute arbitrary SQL commands. WordPress allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a file with a binary content type, which is downloaded even though it cannot contain usable pingback data. Insufficient input sanitising caused an attacker with a normal user account to access the administrative interface. Fixed packages are available from security.debian.org.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1564-1                  security@debian.org
http://www.debian.org/security/                          Thijs Kinkhorst
May 01, 2008                          http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : wordpress
Vulnerability  : multiple
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2007-3639 CVE-2007-4153 CVE-2007-4154 CVE-2007-0540

Several remote vulnerabilities have been discovered in wordpress,
a weblog manager. The Common Vulnerabilities and Exposures project
identifies the following problems:

CVE-2007-3639

   Insufficient input sanitising allowed for remote attackers to
   redirect visitors to external websites.

CVE-2007-4153

   Multiple cross-site scripting vulnerabilities allowed remote
   authenticated administrators to inject arbitrary web script or HTML.

CVE-2007-4154

   SQL injection vulnerability allowed allowed remote authenticated
   administrators to execute arbitrary SQL commands.

CVE-2007-0540

   WordPress allows remote attackers to cause a denial of service
   (bandwidth or thread consumption) via pingback service calls with
   a source URI that corresponds to a file with a binary content type,
   which is downloaded even though it cannot contain usable pingback data.

[no CVE name yet]

   Insufficient input sanitising caused an attacker with a normal user
   account to access the administrative interface.


For the stable distribution (etch), these problems have been fixed in
version 2.0.10-1etch2.

For the unstable distribution (sid), these problems have been fixed in
version 2.2.3-1.

We recommend that you upgrade your wordpress package.

Upgrade instructions
- --------------------

wget url
       will fetch the file for you
dpkg -i file.deb
       will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
       will update the internal database
apt-get upgrade
       will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Source archives:

 http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.0.10.orig.tar.gz
   Size/MD5 checksum:   520314 e9d5373b3c6413791f864d56b473dd54
 http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.0.10-1etch2.diff.gz
   Size/MD5 checksum:    29327 663e0b7c1693ff63715e0253ad5cc036
 http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.0.10-1etch2.dsc
   Size/MD5 checksum:      891 2e297f530d472f47b40ba50ea04b1476

Architecture independent packages:

 http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.0.10-1etch2_all.deb
   Size/MD5 checksum:   521244 4851fe016749b1b9c819fd8d5785198e


 These files will probably be moved into the stable distribution on
 its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iQEVAwUBSBn2/Wz0hbPcukPfAQLb6gf+IJCvU6dxETAGIm85x1JxfcpWyRx3Ept5
toj+TNH90JgYJsH6nIb3dLwGsv9GhSP8DOfwVS3k6hw8D4bSTzTRg+ieRwRYh14h
AYhcK4Xd6XmzP4QOUp34k8bBjup/Jp9ECtXQosh6TocLR5CLS0WV88miuzsDKvTy
FZqTNrzA03n0lhxaIaqombN4g+pUQab6hazqsWJferqwpublDVSQzQFDuRXNnmN0
G8294cyBCDqN4TTaMwO9LPoRQQVJbr2lrKsmOdDKoFVOCNeKpU+gonIw9xWOM2kS
/Sjn95y7pTAqTXirwbcdIXyqsDo1NIZrxN/al3tnv1ZY9NSy0v9Trw==
=BmFA
-----END PGP SIGNATURE-----

Recent comments

10 May 2008 05:40 Avatar edvsb

Debian Wordpress Version
Also Wordpress 2.0.10 have some mistakes and security-gaps. therefore Wordpress always should be the standard software and no particular Debian package which is often very old

Screenshot

Project Spotlight

Kigo Video Converter Ultimate for Mac

A tool for converting and editing videos.

Screenshot

Project Spotlight

Kid3

An efficient tagger for MP3, Ogg/Vorbis, and FLAC files.