Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 10 Jun 2015 11:31:27 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 200758] textproc/elasticsearch: Security vulnerability CVE-2015-4165
Message-ID:  <bug-200758-13@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=200758

            Bug ID: 200758
           Summary: textproc/elasticsearch: Security vulnerability
                    CVE-2015-4165
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
               URL: http://www.securityfocus.com/archive/1/535727/30/0/thr
                    eaded
                OS: Any
            Status: New
          Keywords: needs-patch, security
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: tj@FreeBSD.org
          Reporter: koobs@FreeBSD.org
                CC: ports-secteam@FreeBSD.org
             Flags: maintainer-feedback?(tj@FreeBSD.org)
          Assignee: tj@FreeBSD.org

Elasticsearch versions 1.0.0 - 1.5.2 are vulnerable to an engineered attack on
other applications on the system. The snapshot API may be used indirectly to
place snapshot metadata files into locations that are writeable by the user
running the Elasticsearch process. It is possible to create a file that another
application could read and take action on, such as code execution.

This vulnerability requires several conditions to be exploited. There must be
some other application running on the system that would read Lucene files and
execute code from them. That application must also be accessible to the
attacker, e.g. over the network. Lastly, the Java VM running the Elasticsearch
process must be able to write into a location that the other application will
read and potentially execute.

-- 
You are receiving this mail because:
You are the assignee for the bug.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-200758-13>