Home page logo
/

bugtraq logo Bugtraq mailing list archives

[ MDVSA-2013:067 ] couchdb
From: security () mandriva com
Date: Mon, 08 Apr 2013 18:13:01 +0200

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2013:067
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : couchdb
 Date    : April 8, 2013
 Affected: Business Server 1.0
 _______________________________________________________________________

 Problem Description:

 Updated couchdb packages fix security vulnerabilities:
 
 A security flaw was found in the way Apache CouchDB, a
 distributed,fault- tolerant and schema-free document-oriented
 database accessible via a RESTful HTTP/JSON API, processed certain
 JSON callback. A remote attacker could provide a specially-crafted
 JSON callback that, when processed could lead to arbitrary JSON code
 execution via Adobe Flash (CVE-2012-5649).
 
 A DOM based cross-site scripting (XSS) flaw was found in the
 way browser- based test suite of Apache CouchDB, a distributed,
 fault-tolerant and schema-free document-oriented database accessible
 via a RESTful HTTP/JSON API, processed certain query parameters. A
 remote attacker could provide a specially-crafted web page that,
 when accessed could lead to arbitrary web script or HTML execution
 in the context of a CouchDB user session (CVE-2012-5650).
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5649
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5650
 https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0040
 _______________________________________________________________________

 Updated Packages:

 Mandriva Business Server 1/X86_64:
 3f0ba92ca060b25d74ae60e0a2342c0f  mbs1/x86_64/couchdb-1.2.1-1.mbs1.x86_64.rpm
 9b9d7695b5d17db8cd5b8ba069082584  mbs1/x86_64/couchdb-bin-1.2.1-1.mbs1.x86_64.rpm 
 89310a1386e74172d39eab4910d20c4f  mbs1/SRPMS/couchdb-1.2.1-1.mbs1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFRYsJnmqjQ0CJFipgRAkRlAJ9w15Oh5eW/3q6tx+lusCHO6934dQCgpX/P
dKTfowcU6P3eh9WwjzWqraM=
=O4oI
-----END PGP SIGNATURE-----


  By Date           By Thread  

Current thread:
  • [ MDVSA-2013:067 ] couchdb security (Apr 09)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault