ArchLinux: 201411-25: drupal: session hijacking and denial of service
Summary
Custom configured session.inc and password.inc need to be audited as
well to verify if they are prone to the following vulnerabilities.
More information can be found in the upstream advisory [0].
- CVE-2014-9015 (session hijacking)
Aaron Averill discovered that a specially crafted request can give a
user access to another user's session, allowing an attacker to hijack a
random session.
- CVE-2014-9016 (denial of service)
Michael Cullum, Javier Nieto and Andres Rojas Guerrero discovered that
the password hashing API allows an attacker to send specially crafted
requests resulting in CPU and memory exhaustion. This may lead to the
site becoming unavailable or unresponsive.
Resolution
Upgrade to 7.34-1.
# pacman -Syu "drupal>=7.34-1"
The problems have been fixed upstream in version 7.34.
References
[0] https://www.drupal.org/SA-CORE-2014-006 https://access.redhat.com/security/cve/CVE-2014-9015 https://access.redhat.com/security/cve/CVE-2014-9016 https://seclists.org/oss-sec/2014/q4/697
Workaround
None.