Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 23 Jan 2009 18:24:20 +0100
From: Nico Golde <>
Subject: Re: CVE id request: typo3 SA-2009-001

* Steven M. Christey <> [2009-01-23 13:09]:
> ======================================================
> Name: CVE-2009-0258
> Status: Candidate
> URL:
> Reference: CONFIRM:
> Reference: BID:33376
> Reference: URL:
> Reference: SECUNIA:33617
> Reference: URL:
> Reference: XF:typo3-indexedsearch-command-execution(48138)
> Reference: URL:
> Unspecified vulnerability in the Indexed Search Engine
> (indexed_search) system extension in TYPO3 4.0.0 through 4.0.9, 4.1.0
> through 4.1.7, and 4.2.0 through 4.2.3 allows remote attackers to
> execute arbitrary commands via unknown vectors related to the
> command-line indexer.

Thanks for the ids!
I am just working on a security update for typo3. Looking at 
the patch used for CVE-2009-0258 it is pretty obvious that 
this is exploitable via a crafted filename which is passed 
to various system utilities to get information of the file 

Nico Golde - - - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ