Lucene search

K
debianDebianDEBIAN:DSA-2421-1:367D5
HistoryFeb 29, 2012 - 8:22 p.m.

[SECURITY] [DSA 2421-1] moodle security update

2012-02-2920:22:34
lists.debian.org
12

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

6.6 Medium

AI Score

Confidence

Low

0.007 Low

EPSS

Percentile

81.0%


Debian Security Advisory DSA-2421-1 [email protected]
http://www.debian.org/security/ Moritz Muehlenhoff
February 29, 2012 http://www.debian.org/security/faq


Package : moodle
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE ID : CVE-2011-4308 CVE-2011-4584 CVE-2011-4585 CVE-2011-4586
CVE-2011-4587 CVE-2011-4588 CVE-2012-0792 CVE-2012-0793
CVE-2012-0794 CVE-2012-0795 CVE-2012-0796

Several security issues have been fixed in Moodle, a course management
system for online learning:

CVE-2011-4308 / CVE-2012-0792

Rossiani Wijaya discovered an information leak in
mod/forum/user.php

CVE-2011-4584

MNET authentication didn't prevent a user using "Login As" from
jumping to a remove MNET SSO.

CVE-2011-4585

Darragh Enright discovered that the change password form was send in
over plain HTTP even if httpslogin was set to "true".

CVE-2011-4586

David Michael Evans and German Sanchez Gances discovered CRLF
injection/HTTP response splitting vulnerabilities in the Calendar
module.

CVE-2011-4587

Stephen Mc Guiness discovered empty passwords could be entered in
some circumstances.

CVE-2011-4588

Patrick McNeill that IP address restrictions could be bypassed in
MNET.

CVE-2012-0796

Simon Coggins discovered that additional information could be
injected into mail headers.

CVE-2012-0795

John Ehringer discovered that email adresses were insufficiently
validated.

CVE-2012-0794

Rajesh Taneja discovered that cookie encryption used a fixed key.

CVE-2012-0793

Eloy Lafuente discovered that profile images were insufficiently
protected. A new configuration option "forceloginforprofileimages"
was introduced for that.

For the stable distribution (squeeze), this problem has been fixed in
version 1.9.9.dfsg2-2.1+squeeze3.

For the unstable distribution (sid), this problem has been fixed in
version 1.9.9.dfsg2-5.

We recommend that you upgrade your moodle packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: [email protected]

OSVersionArchitecturePackageVersionFilename
Debian6allmoodle< 1.9.9.dfsg2-2.1+squeeze3moodle_1.9.9.dfsg2-2.1+squeeze3_all.deb

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

6.6 Medium

AI Score

Confidence

Low

0.007 Low

EPSS

Percentile

81.0%