|
Message-ID: <51C2AD28.7090905@redhat.com> Date: Thu, 20 Jun 2013 01:20:08 -0600 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com CC: Forest Monsen <forest.monsen@...il.com> Subject: Re: CVE request for Drupal contributed module -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 06/19/2013 06:09 PM, Forest Monsen wrote: > Hi there, > > I'd like to request a CVE identifier, or identifiers, for: > > SA-CONTRIB-2013-053 - Login Security - Multiple Vulnerabilities > https://drupal.org/node/2023585 > > Maybe two -- denial of service, and access bypass. > > Thanks! > > Forest Monsen, on behalf of the Drupal Security Team When Login Security is configured to use the delay feature, frequent or concurrent failed attempts to login can consume all the web serving processes, causing a denial of service. Please use CVE-2013-2197 for this issue. It is possible to bypass Login Security features when soft blocking is disabled. This is due to the incorrect use of string filtering in the module which can cause the module to skip all checks. Please use CVE-2013-2198 for this issue. - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) iQIcBAEBAgAGBQJRwq0nAAoJEBYNRVNeJnmTx6kP/1tJ13zLlzqa0vTN4qc95pL7 QCEP8h3k+pqJWqDVHMD2KGrXukmTATVU0tWi14IeGMJ748YeW8gp+tNynXGGnAWn tMTW5jql7K9/ZkGe5ILRSt5aEfHgX6BMYfMVsJj+gqiEaO4x2F30yZgVNWj9+3ba VVfPBa5BBOH02LPKfoS+KueTH2Dy6BRh0qUBkjlj9uNHnJ0wnm5EKxw4ui8V8SuI z8lPgCkVSCKjxXYDSmJLFC4hf2OIjS35y/DTYA95HTJV8RRT1uLT6tpo4gW7oKpq k9Zv3mTgKw4ZnmLjKdLuMQBX+LTfyWuFer+cpj9SBujOuM1you204nn9hNkPBGXT ZPoPZQvXvUpxDVEejX2GLUHiWeSHc9tos1/rC2hxVjIvdH/fUhf730sYmcx/jIsq 3TmwyhUvH7yj5olHplGMTbbQO2f+htDUk8bqyCsfum0vO4xkfLwGVhTn6pWDLS5G s6I32JowrBWTj1K/T0EgzSEWomiXnta5Q4r8+WkhDL4brSKEmS4XxdpS8HvbU2wP VJDTh1VlixlpaLznoajbrfo1xMNA47JWmKorQrztAdZzl4dKFo61BwRPak/aU5+C 5+mSDVsaUsEGlK1AQ+ih0v0O0G+gcm93mkgnpC3wtU4Ui9jX2aNNOz/X51n8rLWC 0P7A9+vunyaU4h9yLFF8 =aIiU -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.