SB2016041226 - Multiple vulnerabilities in Debian Linux 



SB2016041226 - Multiple vulnerabilities in Debian Linux

Published: April 12, 2016 Updated: August 9, 2020

Security Bulletin ID SB2016041226
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2015-8537)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

app/views/journals/index.builder in Redmine before 2.6.9, 3.0.x before 3.0.7, and 3.1.x before 3.1.3 allows remote attackers to obtain sensitive information by viewing an Atom feed.


2) Input validation error (CVE-ID: CVE-2015-8474)

The vulnerability allows a remote non-authenticated attacker to manipulate data.

Open redirect vulnerability in the valid_back_url function in app/controllers/application_controller.rb in Redmine before 2.6.7, 3.0.x before 3.0.5, and 3.1.x before 3.1.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a crafted back_url parameter, as demonstrated by "@attacker.com," a different vulnerability than CVE-2014-1985. <a href="http://cwe.mitre.org/data/definitions/601.html">CWE-601: URL Redirection to Untrusted Site ('Open Redirect')</a>


3) Information disclosure (CVE-ID: CVE-2015-8473)

The vulnerability allows a remote authenticated user to gain access to sensitive information.

The Issues API in Redmine before 2.6.8, 3.0.x before 3.0.6, and 3.1.x before 3.1.2 allows remote authenticated users to obtain sensitive information in changeset messages by leveraging permission to read issues with related changesets from other projects.


Remediation

Install update from vendor's website.