[arch-security] [Arch Linux Security Advisory ASA-201411-25] drupal: session hijacking and denial of service

Levente Polyak anthraxx at archlinux.org
Thu Nov 20 21:52:52 UTC 2014

Arch Linux Security Advisory ASA-201411-25

Severity: Medium
Date    : 2014-11-20
CVE-ID  : CVE-2014-9015 CVE-2014-9016
Package : drupal
Type    : session hijacking, denial of service
Remote  : Yes
Link    : https://wiki.archlinux.org/index.php/CVE-2014


The package drupal before version 7.34-1 is vulnerable to multiple
issues leading to session hijacking or denial of service.


Upgrade to 7.34-1.

# pacman -Syu "drupal>=7.34-1"

The problems have been fixed upstream in version 7.34.




Custom configured session.inc and password.inc need to be audited as
well to verify if they are prone to the following vulnerabilities.
More information can be found in the upstream advisory [0].

- CVE-2014-9015 (session hijacking)
Aaron Averill discovered that a specially crafted request can give a
user access to another user's session, allowing an attacker to hijack a
random session.

- CVE-2014-9016 (denial of service)
Michael Cullum, Javier Nieto and Andres Rojas Guerrero discovered that
the password hashing API allows an attacker to send specially crafted
requests resulting in CPU and memory exhaustion. This may lead to the
site becoming unavailable or unresponsive.


A remote attacker is able to send specially crafted requests to hijack
random sessions or exhaust the CPU and memory leading to denial of service.


[0] https://www.drupal.org/SA-CORE-2014-006

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20141120/418c2f12/attachment-0001.bin>

More information about the arch-security mailing list