[Bug 200758] textproc/elasticsearch: Security vulnerability CVE-2015-4165

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Wed Jun 10 11:31:27 UTC 2015


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=200758

            Bug ID: 200758
           Summary: textproc/elasticsearch: Security vulnerability
                    CVE-2015-4165
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
               URL: http://www.securityfocus.com/archive/1/535727/30/0/thr
                    eaded
                OS: Any
            Status: New
          Keywords: needs-patch, security
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: tj at FreeBSD.org
          Reporter: koobs at FreeBSD.org
                CC: ports-secteam at FreeBSD.org
             Flags: maintainer-feedback?(tj at FreeBSD.org)
          Assignee: tj at FreeBSD.org

Elasticsearch versions 1.0.0 - 1.5.2 are vulnerable to an engineered attack on
other applications on the system. The snapshot API may be used indirectly to
place snapshot metadata files into locations that are writeable by the user
running the Elasticsearch process. It is possible to create a file that another
application could read and take action on, such as code execution.

This vulnerability requires several conditions to be exploited. There must be
some other application running on the system that would read Lucene files and
execute code from them. That application must also be accessible to the
attacker, e.g. over the network. Lastly, the Java VM running the Elasticsearch
process must be able to write into a location that the other application will
read and potentially execute.

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the freebsd-ports-bugs mailing list