Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2014.1852 drupal7 security update 16 October 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: drupal7 Publisher: Debian Operating System: Debian GNU/Linux 7 Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2014-3704 Reference: ESB-2014.1851 Original Bulletin: http://www.debian.org/security/2014/dsa-3051 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-3051-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff October 15, 2014 http://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : drupal7 CVE ID : CVE-2014-3704 Stefan Horst discovered a vulnerability in the Drupal database abstraction API, which may result in SQL injection. For the stable distribution (wheezy), this problem has been fixed in version 7.14-2+deb7u7. For the unstable distribution (sid), this problem has been fixed in version 7.32-1. We recommend that you upgrade your drupal7 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJUPr6CAAoJEBDCk7bDfE4234sP/3DpDnhz7KBXfzsT9U/Sn+kC hQMwFaurUZshmXmS4zkvCsoFnGryDYlaXmB5nDo4piODxPVNwe0Ea01l5o6XCi5/ CJlFPfC6ev+EBjUr2bDqjdFuIQnxOE3Kj3Dc6HkQnBdz6DmeeSLO/h02ESQ+q6N7 q5YgbBhAdhQvn5rC+gC3vlLh3UpIS/GN+SaSLZiPwl5nDRmQHFSEJi27X3i1IVsv bbKkhz5Tar9SFTOODoOHi07ujVg8hGY8bHGoviippOXQmnevRjTR70mXRlkAIS5L FEsajTEQeLYJHg8sREwl2btBmsIsGun1rrvNEE4IK3eV9evFh5Cad/Be5b+x7xZW crqD2psllabcRcYQGDdxkj/3CYtZbdZzmZx8zU+VO7BwFFcaTftsoNTxv8Jq0/U1 BdTy6zZ+liGJT1aCKyKeW4NDfGaw+wK62JY7XPT/eGxBXKE0U8anE3vsb3l4tpjh bMLsZWsXdPNcqFujzY02niTm6W7keRxPruhZrtNI5F2JmNUQT9pS3cEVQNFDj2IE ZFlWJztKIDM2z3jh4em41Thtd2ddeT+KNInRp9OysqZCkbGj/WemSk1RI3cff8P2 piFvAV79TnYaNUx3fG22FerLXwLWetfeaUmEfmGCWe0YwYJa2AjcReQ0wpEvtJUU 6n7hTUBNFU437lS29jCd =c5tm - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVD8dNxLndAQH1ShLAQKGqhAAnpM9sKlAeAVpD9vdjw4ipQYEl2u2Izv8 hjo13rrzBHeXrp0xlAR2+P7onM/J+E0FR5UAu+0x4o2f+hERc17WqbnCJSaOJmTT U7n3BX9lDuvwZXbi3z1zZ3aKzdm03UB0cWO0vbpfvKe5kgmV89wtMksBSQLtwPOD p0xUlovxcL5X7c4vEGednLMYwCS7N1QiWITvJ8wZplwG/SuKQ0h38fdVW8JHR3QE 4FETTJJxT1j2wWBku8t7hvo3dCdLKDLmCmPgYGi5RIh/SyKZA0uBVq2xMtEob0n0 l/egX/6gU7jvXdtT+F6HCp2LGI0vhATS0rh6Hp/pbF+6IGk404LH/B0zUmyD6uxH aQretLnC0tpeSkXhuskDjiiEatVIxsT/glTWH5CfVM8Ls+o3L2T6cG2d+jtW787Y txJLwb9KgL+COBfE01Ip/Aaih91X/ym/vlzXMd+p2Z4C1atUKEXn8evZbehP4j39 Ciemxg8F/oBpRnzs10i7vXjDZHyVQJi1pUFKuWO6SzKqkwVo/FiPZg0911UmebN0 KBb7NVWTFDDh7//5fYtzVLPN0ZKHzRJlMH4IsbIt0lSq2R4+JJKPMRhlpqut8coB t7pU98Asd/zzcYQwdn4I6XnGfrzWLK3I/GrOobfkXs/nFYVBpv+S9sV5sAsdHv4j Ymd030fc8uI= =BIZh -----END PGP SIGNATURE-----