CVE-2012-5868

NameCVE-2012-5868
DescriptionWordPress 3.4.2 does not invalidate a wordpress_sec session cookie upon an administrator's logout action, which makes it easier for remote attackers to discover valid session identifiers via a brute-force attack, or modify data via a replay attack.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitylow (attack range: remote)
Debian Bugs696868

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
wordpress (PTS)wheezy3.6.1+dfsg-1~deb7u10vulnerable
wheezy (security)3.6.1+dfsg-1~deb7u20vulnerable
jessie4.1+dfsg-1+deb8u15vulnerable
jessie (security)4.1+dfsg-1+deb8u16vulnerable
stretch4.7.5+dfsg-2+deb9u1vulnerable
stretch (security)4.7.5+dfsg-2+deb9u2vulnerable
buster, sid4.9.1+dfsg-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
wordpresssource(unstable)(unfixed)unimportant696868

Notes

non-issue, see https://wordpress.org/support/topic/old-bug-cve-2012-5868

Search for package or bug name: Reporting problems