Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU44823
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2011-2380
CWE-ID:
CWE-200 - Exposure of sensitive information to an unauthorized actor
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
Bugzilla 2.23.3 through 2.22.7, 3.0.x through 3.3.x, 3.4.x before 3.4.12, 3.5.x, 3.6.x before 3.6.6, 3.7.x, 4.0.x before 4.0.2, and 4.1.x before 4.1.3 allows remote attackers to determine the existence of private group names via a crafted parameter during (1) bug creation or (2) bug editing.
MitigationInstall update from vendor's website.
Vulnerable software versionsBugzilla: 2.22.7 - 4.1.2
CPE2.3https://secunia.com/advisories/45501
https://www.bugzilla.org/security/3.4.11/
https://www.debian.org/security/2011/dsa-2322
https://www.osvdb.org/74298
https://www.osvdb.org/74299
https://www.securityfocus.com/bid/49042
https://bugzilla.mozilla.org/show_bug.cgi?id=653477
https://exchange.xforce.ibmcloud.com/vulnerabilities/69034
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU44824
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2011-2381
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
CRLF injection vulnerability in Bugzilla 2.17.1 through 2.22.7, 3.0.x through 3.3.x, 3.4.x before 3.4.12, 3.5.x, 3.6.x before 3.6.6, 3.7.x, 4.0.x before 4.0.2, and 4.1.x before 4.1.3 allows remote attackers to inject arbitrary e-mail headers via an attachment description in a flagmail notification.
MitigationInstall update from vendor's website.
Vulnerable software versionsBugzilla: 2.17.1 - 4.1.2
CPE2.3https://secunia.com/advisories/45501
https://www.bugzilla.org/security/3.4.11/
https://www.debian.org/security/2011/dsa-2322
https://www.osvdb.org/74300
https://www.securityfocus.com/bid/49042
https://bugzilla.mozilla.org/show_bug.cgi?id=657158
https://exchange.xforce.ibmcloud.com/vulnerabilities/69035
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU44826
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2011-2978
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
Bugzilla 2.16rc1 through 2.22.7, 3.0.x through 3.3.x, 3.4.x before 3.4.12, 3.5.x, 3.6.x before 3.6.6, 3.7.x, 4.0.x before 4.0.2, and 4.1.x before 4.1.3 does not prevent changes to the confirmation e-mail address (aka old_email field) for e-mail change notifications, which makes it easier for remote attackers to perform arbitrary address changes by leveraging an unattended workstation.
MitigationInstall update from vendor's website.
Vulnerable software versionsBugzilla: 2.16 - 4.1.2
CPE2.3https://secunia.com/advisories/45501
https://www.bugzilla.org/security/3.4.11/
https://www.debian.org/security/2011/dsa-2322
https://www.osvdb.org/74301
https://www.securityfocus.com/bid/49042
https://bugzilla.mozilla.org/show_bug.cgi?id=670868
https://exchange.xforce.ibmcloud.com/vulnerabilities/69036
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU44827
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2011-2979
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
Bugzilla 4.1.x before 4.1.3 generates different responses for certain assignee queries depending on whether the group name is valid, which allows remote attackers to determine the existence of private group names via a custom search. NOTE: this vulnerability exists because of a CVE-2010-2756 regression.
MitigationInstall update from vendor's website.
Vulnerable software versionsBugzilla: 4.1 - 4.1.2
CPE2.3https://secunia.com/advisories/45501
https://www.bugzilla.org/security/3.4.11/
https://www.debian.org/security/2011/dsa-2322
https://www.osvdb.org/74298
https://www.osvdb.org/74299
https://www.securityfocus.com/bid/49042
https://bugzilla.mozilla.org/show_bug.cgi?id=674497
https://exchange.xforce.ibmcloud.com/vulnerabilities/69166
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.