Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Less critical

Django "i18n" Denial of Service Vulnerability

-

Release Date:  2007-10-29    Last Update:  2007-10-31    Views:  11,644

Secunia Advisory SA27435

Where:

From remote

Impact:

DoS

Solution Status:

Vendor Patch

Software:

CVE Reference(s):

Description


A vulnerability has been reported in Django, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to the Django internationalization system ("i18n") incorrectly processing HTTP headers. This can be exploited to allocate large amounts of memory by sending specially crafted HTTP "Accept-Language" requests.

Successful exploitation requires that the "USE_I18N" option and the "i18n" middleware component are enabled.

The vulnerability is reported in version 0.91, 0.95, 0.95.1 and 0.96.


Solution:
Update to 0.91.1, 0.95.2 or 0.96.1, or apply patches:

Further details available to Secunia VIM customers

Provided and/or discovered by:
Reported by the vendor.

Original Advisory:
http://www.djangoproject.com/weblog/2007/oct/26/security-fix/

Deep Links:
Links available to Secunia VIM customers

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Django "i18n" Denial of Service Vulnerability

User Message
[+]

pinkgranite

RE: Django "i18n" Denial of Service Vulnerability
This reply has been minimised due to a negative Relevancy Score.
thedillpickl RE: Django "i18n" Denial of Service Vulnerability
Contributor 17th Jul, 2010 00:16
Score: 376
Posts: 872
User Since: 3rd May 2009
System Score: 100%
Location: US
Hi pinkgranite;

Secunia is explaining the vulnerability, not seeking thoughts or opinions.

If, however, someone has working knowledge of the vulnerability and has pertinent information regarding it, then it is appropriate to post here. Otherwise it might be better to post opinions in the "Open Discussions" part of the forum.

Hope this tip helps!


Regards;

Fred

--
XP Home
Chrome, Firefox, IE8
--
consilio et animis
Was this reply relevant?
+1
-1

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability