Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name MDVSA-2011:003 First vendor Publication 2011-01-10
Vendor Mandriva Last vendor Modification 2011-01-10
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple vulnerabilities has been found and corrected in MHonArc:

MHonArc 2.6.16 allows remote attackers to cause a denial of service (CPU consumption) via start tags that are placed within other start tags, as demonstrated by a <bo<bo<bo<bo<body>dy>dy>dy>dy> sequence, a different vulnerability than CVE-2010-4524 (CVE-2010-1677).

Cross-site scripting (XSS) vulnerability in lib/mhtxthtml.pl in MHonArc 2.6.16 allows remote attackers to inject arbitrary web script or HTML via a malformed start tag and end tag for a SCRIPT element, as demonstrated by <scr<body>ipt> and </scr<body>ipt> sequences (CVE-2010-4524).

Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&products_id=490

The updated packages have been upgraded to the latest version (2.6.18) which is not vulnerable to these issues.

Original Source

Url : http://www.mandriva.com/security/advisories?name=MDVSA-2011:003

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-399 Resource Management Errors
50 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

OpenVAS Exploits

Date Description
2011-03-25 Name : Fedora Update for mhonarc FEDORA-2011-3357
File : nvt/gb_fedora_2011_3357_mhonarc_fc13.nasl
2011-03-25 Name : Fedora Update for mhonarc FEDORA-2011-3390
File : nvt/gb_fedora_2011_3390_mhonarc_fc14.nasl
2011-01-14 Name : Mandriva Update for MHonArc MDVSA-2011:003 (MHonArc)
File : nvt/gb_mandriva_MDVSA_2011_003.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
70287 MHonArc Start Tag Nesting Remote DoS

MHonArc contains a flaw that may allow a remote denial of service. The issue is triggered when a remote attacker nests start tags within other start tags, causing a denial of service via CPU consumption.
70085 MHonArc lib/mhtxthtml.pl HTML Email Conversion XSS

MHonArc contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application contains the 'lib/mhtxthtml.pl' script which does not properly convert HTML e-mails with malformed HTML tags of the form '<scr<body>ipt>'. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.

Nessus® Vulnerability Scanner

Date Description
2011-03-24 Name : The remote Fedora host is missing a security update.
File : fedora_2011-3357.nasl - Type : ACT_GATHER_INFO
2011-03-24 Name : The remote Fedora host is missing a security update.
File : fedora_2011-3390.nasl - Type : ACT_GATHER_INFO
2011-03-21 Name : The remote Fedora host is missing a security update.
File : fedora_2011-3344.nasl - Type : ACT_GATHER_INFO
2011-01-28 Name : The remote Mandriva Linux host is missing a security update.
File : mandriva_MDVSA-2011-003.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:41:59
  • Multiple Updates