A weakness was found in the way MediaWiki, a wiki engine, performed generation of password reset tokens. A remote attacker could use various techniques to recover original PRNG information, that has been used for seeding / generation of a password reset token, possibly leading to ability to compromise the user account in question. References: [1] http://lists.wikimedia.org/pipermail/wikitech-l/2012-March/059230.html Upstream bug: [2] https://bugzilla.wikimedia.org/show_bug.cgi?id=35078 Upstream patch -- introduce MWCryptRand() contained within: [3] https://www.mediawiki.org/wiki/Special:Code/MediaWiki/114429 parts: i) Index: branches/wmf/1.19wmf1/includes/CryptRand.php and ii) Index: branches/wmf/1.19wmf1/includes/User.php
This issue affects the versions of the mediawiki package, as shipped with Fedora release of 15 and 16. -- This issue affects the version of the mediawiki package, as shipped with Fedora EPEL 5.
Created mediawiki tracking bugs for this issue Affects: fedora-all [bug 806398]
Created mediawiki tracking bugs for this issue Affects: epel-5 [bug 806399]
The CVE identifier of CVE-2012-1581 has been assigned to this issue: http://www.openwall.com/lists/oss-security/2012/03/24/1
The current version of mediawiki in Fedora is not vulnerable to this issue (1.19.4), however EPEL5 still provides mediawiki 1.14 as well as 1.16; EPEL6 and Fedora also provide 1.16. It is unknown whether or not those versions are affected by this issue as they are no longer supported by upstream.