Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title New moodle packages fix several vulnerabilities
Informations
Name DSA-1986 First vendor Publication 2010-02-02
Vendor Debian Last vendor Modification 2010-02-02
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Several vulnerabilities have been discovered in Moodle, an online course management system. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2009-4297

Multiple cross-site request forgery (CSRF) vulnerabilities have been discovered.

CVE-2009-4298

It has been discovered that the LAMS module is prone to the disclosure of user account information.

CVE-2009-4299

The Glossary module has an insufficient access control mechanism.

CVE-2009-4301

Moodle does not properly check permissions when the MNET service is enabled, which allows remote authenticated servers to execute arbitrary MNET functions.

CVE-2009-4302

The login/index_form.html page links to an HTTP page instead of using an SSL secured connection.

CVE-2009-4303

Moodle stores sensitive data in backup files, which might make it possible for attackers to obtain them.

CVE-2009-4305

It has been discovered that the SCORM module is prone to an SQL injection.

Additionally, an SQL injection in the update_record function, a problem with symbolic links and a verification problem with Glossary, database and forum ratings have been fixed.

For the stable distribution (lenny), these problems have been fixed in version 1.8.2.dfsg-3+lenny3.

For the oldstable distribution (etch), there are no fixed packages available and it is too hard to backport many of the fixes. Therefore, we recommend to upgrade to the lenny version.

For the testing distribution (squeeze) and the unstable distribution (sid), these problems have been fixed in version 1.8.2.dfsg-6.

We recommend that you upgrade your moodle packages.

Original Source

Url : http://www.debian.org/security/2010/dsa-1986

CWE : Common Weakness Enumeration

% Id Name
29 % CWE-264 Permissions, Privileges, and Access Controls
29 % CWE-200 Information Exposure
14 % CWE-352 Cross-Site Request Forgery (CSRF) (CWE/SANS Top 25)
14 % CWE-310 Cryptographic Issues
14 % CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:13343
 
Oval ID: oval:org.mitre.oval:def:13343
Title: DSA-1986-1 moodle -- several vulnerabilities
Description: Several vulnerabilities have been discovered in Moodle, an online course management system. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-4297 Multiple cross-site request forgery vulnerabilities have been discovered. CVE-2009-4298 It has been discovered that the LAMS module is prone to the disclosure of user account information. CVE-2009-4299 The Glossary module has an insufficient access control mechanism. CVE-2009-4301 Moodle does not properly check permissions when the MNET service is enabled, which allows remote authenticated servers to execute arbitrary MNET functions. CVE-2009-4302 The login/index_form.html page links to an HTTP page instead of using an SSL secured connection. CVE-2009-4303 Moodle stores sensitive data in backup files, which might make it possible for attackers to obtain them. CVE-2009-4305 It has been discovered that the SCORM module is prone to an SQL injection. Additionally, an SQL injection in the update_record function, a problem with symbolic links and a verification problem with Glossary, database and forum ratings have been fixed. For the stable distribution, these problems have been fixed in version 1.8.2.dfsg-3+lenny3. For the oldstable distribution, there are no fixed packages available and it is too hard to backport many of the fixes. Therefore, we recommend to upgrade to the lenny version. For the testing distribution and the unstable distribution , these problems have been fixed in version 1.8.2.dfsg-6. We recommend that you upgrade your moodle packages.
Family: unix Class: patch
Reference(s): DSA-1986-1
CVE-2009-4297
CVE-2009-4298
CVE-2009-4299
CVE-2009-4301
CVE-2009-4302
CVE-2009-4303
CVE-2009-4305
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): moodle
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:6671
 
Oval ID: oval:org.mitre.oval:def:6671
Title: DSA-1986 moodle -- several vulnerabilities
Description: Several vulnerabilities have been discovered in Moodle, an online course management system. The Common Vulnerabilities and Exposures project identifies the following problems: Multiple cross-site request forgery vulnerabilities have been discovered. It has been discovered that the LAMS module is prone to the disclosure of user account information. The Glossary module has an insufficient access control mechanism. Moodle does not properly check permissions when the MNET service is enabled, which allows remote authenticated servers to execute arbitrary MNET functions. The login/index_form.html page links to an HTTP page instead of using an SSL secured connection. Moodle stores sensitive data in backup files, which might make it possible for attackers to obtain them. It has been discovered that the SCORM module is prone to an SQL injection. Additionally, an SQL injection in the update_record function, a problem with symbolic links and a verification problem with Glossary, database and forum ratings have been fixed.
Family: unix Class: patch
Reference(s): DSA-1986
CVE-2009-4297
CVE-2009-4298
CVE-2009-4299
CVE-2009-4301
CVE-2009-4302
CVE-2009-4303
CVE-2009-4305
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): moodle
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 15

OpenVAS Exploits

Date Description
2010-02-10 Name : Debian Security Advisory DSA 1986-1 (moodle)
File : nvt/deb_1986_1.nasl
2009-12-14 Name : Fedora Core 12 FEDORA-2009-13065 (moodle)
File : nvt/fcore_2009_13065.nasl
2009-12-14 Name : Fedora Core 11 FEDORA-2009-13080 (moodle)
File : nvt/fcore_2009_13080.nasl
2009-12-09 Name : Moodle Multiple Vulnerabilities
File : nvt/moodle_37244.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
61173 Moodle Backup File Storage Local Information Disclosure

61172 Moodle login/index_form.html HTTPS Port Link Weakness Cleartext Credential Re...

60818 Moodle SCORM Module Unspecified SQL Injection

60817 Moodle mnet/lib.php MNET Interface Access Restriction Weakness MNET Function ...

60816 Moodle mod/glossary/showentry.php Glossary Entry Access Restriction Weakness

60815 Moodle LAMS Module Unspecified Information Disclosure

60814 Moodle Unspecified CSRF

Nessus® Vulnerability Scanner

Date Description
2010-02-24 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1986.nasl - Type : ACT_GATHER_INFO
2010-02-15 Name : The remote openSUSE host is missing a security update.
File : suse_11_0_moodle-100208.nasl - Type : ACT_GATHER_INFO
2010-02-15 Name : The remote openSUSE host is missing a security update.
File : suse_11_1_moodle-100208.nasl - Type : ACT_GATHER_INFO
2009-12-14 Name : The remote Fedora host is missing a security update.
File : fedora_2009-13040.nasl - Type : ACT_GATHER_INFO
2009-12-14 Name : The remote Fedora host is missing a security update.
File : fedora_2009-13065.nasl - Type : ACT_GATHER_INFO
2009-12-14 Name : The remote Fedora host is missing a security update.
File : fedora_2009-13080.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:29:12
  • Multiple Updates