A security flaw was found in the way flowplayer SWF file handling functionality of Gallery version 3, an open source project with the goal to develop and support leading photo sharing web application solutions, processed certain URL fragments passed to this file (certain URL fragments were not stripped properly when these files were called via direct URL request(s)). A remote attacker could use this flaw to conduct replay attacks. A different vulnerability than CVE-2013-2138. References: [1] http://galleryproject.org/gallery_3_0_9 Upstream ticket: [2] http://sourceforge.net/apps/trac/gallery/ticket/2073 Relevant upstream patch: [3] https://github.com/gallery/gallery3/commit/c5318bb1a2dd266b50317a2adb74d74338593733
This issue affects the versions of the gallery3 package, as shipped with Fedora release of 17, 18, and 19. Please schedule an update. -- This issue affects the versions of the gallery3 package, as shipped with Fedora EPEL-6. Please schedule an update.
CVE Request: http://www.openwall.com/lists/oss-security/2013/07/04/7
Created gallery3 tracking bugs for this issue: Affects: fedora-all [bug 981218] Affects: epel-6 [bug 981219]