[Bug 200758] textproc/elasticsearch: Security vulnerability CVE-2015-4165
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Wed Jun 10 11:31:27 UTC 2015
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=200758
Bug ID: 200758
Summary: textproc/elasticsearch: Security vulnerability
CVE-2015-4165
Product: Ports & Packages
Version: Latest
Hardware: Any
URL: http://www.securityfocus.com/archive/1/535727/30/0/thr
eaded
OS: Any
Status: New
Keywords: needs-patch, security
Severity: Affects Only Me
Priority: ---
Component: Individual Port(s)
Assignee: tj at FreeBSD.org
Reporter: koobs at FreeBSD.org
CC: ports-secteam at FreeBSD.org
Flags: maintainer-feedback?(tj at FreeBSD.org)
Assignee: tj at FreeBSD.org
Elasticsearch versions 1.0.0 - 1.5.2 are vulnerable to an engineered attack on
other applications on the system. The snapshot API may be used indirectly to
place snapshot metadata files into locations that are writeable by the user
running the Elasticsearch process. It is possible to create a file that another
application could read and take action on, such as code execution.
This vulnerability requires several conditions to be exploited. There must be
some other application running on the system that would read Lucene files and
execute code from them. That application must also be accessible to the
attacker, e.g. over the network. Lastly, the Java VM running the Elasticsearch
process must be able to write into a location that the other application will
read and potentially execute.
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ports-bugs
mailing list