Operating System:

[Debian]

Published:

04 August 2016

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.1885
                         wordpress security update
                               4 August 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           wordpress
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Denial of Service        -- Remote/Unauthenticated      
                   Cross-site Scripting     -- Remote with User Interaction
                   Access Confidential Data -- Remote/Unauthenticated      
                   Unauthorised Access      -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-5839 CVE-2016-5838 CVE-2016-5837
                   CVE-2016-5835 CVE-2016-5834 CVE-2016-5832
                   CVE-2015-8834  

Reference:         ASB-2016.0068.2
                   ASB-2015.0048.2

Original Bulletin: 
   http://www.debian.org/security/2016/dsa-3639

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3639-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
August 03, 2016                       https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : wordpress
CVE ID         : CVE-2015-8834 CVE-2016-5832 CVE-2016-5834 CVE-2016-5835 
                 CVE-2016-5837 CVE-2016-5838 CVE-2016-5839

Several vulnerabilities were discovered in wordpress, a web blogging
tool, which could allow remote attackers to compromise a site via
cross-site scripting, bypass restrictions, obtain sensitive
revision-history information, or mount a denial of service.

For the stable distribution (jessie), these problems have been fixed in
version 4.1+dfsg-1+deb8u9.

We recommend that you upgrade your wordpress packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=C78N
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=IBz7
-----END PGP SIGNATURE-----