~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to retired/CVE-2014-1613

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
Candidate: CVE-2014-1613
2
 
PublicDate: 2014-05-16
3
 
References:
4
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1613
5
 
 http://dotclear.org/blog/post/2014/01/20/Dotclear-2.6.2
6
 
 https://labs.mwrinfosecurity.com/advisories/2014/05/14/dotclear-php-object-injection/
7
 
Description:
8
 
 Dotclear before 2.6.2 allows remote attackers to execute arbitrary PHP code
9
 
 via a serialized object in the dc_passwd cookie to a password-protected
10
 
 page, which is not properly handled by (1) inc/public/lib.urlhandlers.php
11
 
 or (2) plugins/pages/_public.php.
12
 
Ubuntu-Description:
13
 
Notes:
14
 
Bugs:
15
 
Priority: medium
16
 
Discovered-by: Charlie Briggs
17
 
Assigned-to:
18
 
 
19
 
Patches_dotclear:
20
 
upstream_dotclear: released (2.6.2)
21
 
lucid_dotclear: DNE
22
 
precise_dotclear: ignored (reached end-of-life)
23
 
precise/esm_dotclear: DNE (precise was needed)
24
 
saucy_dotclear: ignored (reached end-of-life)
25
 
trusty_dotclear: not-affected
26
 
utopic_dotclear: not-affected
27
 
vivid_dotclear: not-affected
28
 
vivid/stable-phone-overlay_dotclear: DNE
29
 
vivid/ubuntu-core_dotclear: DNE
30
 
wily_dotclear: not-affected
31
 
xenial_dotclear: not-affected
32
 
yakkety_dotclear: DNE
33
 
zesty_dotclear: DNE
34
 
devel_dotclear: DNE