[arch-security] [Arch Linux Security Advisory ASA-201411-25] drupal: session hijacking and denial of service
anthraxx at archlinux.org
Thu Nov 20 21:52:52 UTC 2014
Arch Linux Security Advisory ASA-201411-25
Date : 2014-11-20
CVE-ID : CVE-2014-9015 CVE-2014-9016
Package : drupal
Type : session hijacking, denial of service
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE-2014
The package drupal before version 7.34-1 is vulnerable to multiple
issues leading to session hijacking or denial of service.
Upgrade to 7.34-1.
# pacman -Syu "drupal>=7.34-1"
The problems have been fixed upstream in version 7.34.
Custom configured session.inc and password.inc need to be audited as
well to verify if they are prone to the following vulnerabilities.
More information can be found in the upstream advisory .
- CVE-2014-9015 (session hijacking)
Aaron Averill discovered that a specially crafted request can give a
user access to another user's session, allowing an attacker to hijack a
- CVE-2014-9016 (denial of service)
Michael Cullum, Javier Nieto and Andres Rojas Guerrero discovered that
the password hashing API allows an attacker to send specially crafted
requests resulting in CPU and memory exhaustion. This may lead to the
site becoming unavailable or unresponsive.
A remote attacker is able to send specially crafted requests to hijack
random sessions or exhaust the CPU and memory leading to denial of service.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 819 bytes
Desc: OpenPGP digital signature
More information about the arch-security