CVE-2010-4535
Published: 22 December 2010
The password reset functionality in django.contrib.auth in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not validate the length of a string representing a base36 timestamp, which allows remote attackers to cause a denial of service (resource consumption) via a URL that specifies a large base36 integer.
Priority
Status
Package | Release | Status |
---|---|---|
python-django Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
hardy |
Ignored
(end of life)
|
|
karmic |
Released
(1.1.1-1ubuntu1.1)
|
|
lucid |
Released
(1.1.1-2ubuntu1.2)
|
|
maverick |
Released
(1.2.3-1ubuntu0.2.10.10.1)
|
|
natty |
Released
(1.2.3-1ubuntu0.2.11.04.1)
|
|
oneiric |
Released
(1.2.3-1ubuntu0.2.11.04.1)
|
|
upstream |
Released
(1.2.4-1)
|
|
Patches: upstream: http://code.djangoproject.com/changeset/15034 upstream: http://code.djangoproject.com/changeset/15036 |