Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 573770 - <net-analyzer/greenbone-security-assistant-6.0.9 vulnerable to denial-of-service attack
Summary: <net-analyzer/greenbone-security-assistant-6.0.9 vulnerable to denial-of-serv...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: ~3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2016-02-03 12:24 UTC by Justin Lecher (RETIRED)
Modified: 2016-07-02 08:16 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Justin Lecher (RETIRED) gentoo-dev 2016-02-03 12:24:13 UTC
Hello,

The OpenVAS developers have just released an important security release
for the Open Vulnerability Assessment System release series 8
(OpenVAS-8).

The following package was released:
- Greenbone Security Assistant 6.0.9.

We highly recommend to update your OpenVAS installation to the version
listed above as soon as possible.

It has been identified that Greenbone Security Assistant (GSA) is
vulnerable to a denial-of-service attack due to a improper handling of
UTF-8 in GET and POST requests. Given the attacker has access to a GSA
web interface, a respective HTTP request can crash gsad.

For details and current information on this vulnerability please refer
to the following page on the OpenVAS website:

  http://openvas.org/OVSA20160202.html

The source tarballs for the releases are available for download from the
OpenVAS website at:

  https://wald.intevation.org/frs/?group_id=29

This page contains signatures and checksums for the source tarballs as
well.

You can find links to the latest source tarballs for all currently
maintained releases here:

  http://openvas.org/install-source.html

Binary packages for major GNU/Linux distributions by third parties are
expected to follow soon.

Regards,


Michael Wiegand
Comment 1 Hanno Böck gentoo-dev 2016-02-03 13:20:29 UTC
Update committed. No stable keywords, so I think we're done.
Comment 2 Aaron Bauman (RETIRED) gentoo-dev 2016-06-30 12:03:43 UTC
@Hanno, please cleanup vulnerable version 6.0.8 and feel free to close this bug.  If time doesn't permit I can cleanup with your permission.  Thanks.
Comment 3 Hanno Böck gentoo-dev 2016-07-01 13:16:16 UTC
cleanup done
Comment 4 Aaron Bauman (RETIRED) gentoo-dev 2016-07-02 00:10:09 UTC
(In reply to Hanno Boeck from comment #3)
> cleanup done

6.0.8 is still in the tree... mix up bug numbers? :D
Comment 5 Hanno Böck gentoo-dev 2016-07-02 08:06:38 UTC
No, just forgot to git push :-)
Now really done.
Comment 6 Aaron Bauman (RETIRED) gentoo-dev 2016-07-02 08:16:53 UTC
(In reply to Hanno Boeck from comment #5)
> No, just forgot to git push :-)
> Now really done.

Thanks, Hanno!