Arch Linux Security Advisory ASA-201510-4
=========================================

Severity: High
Date    : 2015-10-08
CVE-ID  : CVE-2015-4499
Package : bugzilla
Type    : unauthorized account creation
Remote  : Yes
Link    : https://wiki.archlinux.org/index.php/CVE

Summary
=======

The package bugzilla before version 5.0.1-1 is vulnerable to
unauthorized account creation.

Resolution
==========

Upgrade to 5.0.1-1.

# pacman -Syu "bugzilla>=5.0.1-1"

The problem has been fixed upstream in version 5.0.1.

Workaround
==========

None.

Description
===========

Login names (usually an email address) longer than 127 characters are
silently truncated in MySQL which could cause the domain name of the
email address to be corrupted. An attacker could use this vulnerability
to create an account with an email address different from the one
originally requested. The login name could then be automatically added
to groups based on the group's regular expression setting.
This vulnerability has been demonstrated by truncation of an
@mozilla.com.example.com address to an @mozilla.com address that
resulted in an unauthorized account creation with the default privileges
of the mozilla group.

Impact
======

A remote attacker is able to obtain default privileges for an arbitrary
domain name by placing that name in a substring of an address resulting
in unauthorized account creation.

References
==========

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-4499
https://www.bugzilla.org/security/4.2.14/
https://bugzilla.mozilla.org/show_bug.cgi?id=1202447
https://bugs.archlinux.org/task/46573

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to