Date: Fri, 5 Sep 2014 10:29:50 +0300 From: Henri Salo <henri@...v.fi> To: oss-security@...ts.openwall.com Cc: TYPO3 Security Team <security@...o3.org> Subject: CVE request: TYPO3-EXT-SA-2014-003 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Can I get 2014 CVE for TYPO3-EXT-SA-2014-003, thanks. http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-003 http://osvdb.org/103258 Release Date: February 12, 2014 Affected Versions: Version 3.5.1 and below Vulnerability Type: Insecure Unserialize Severity: High Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:P/A:C/E:P/RL:O/RC:C Problem Description: Failing to sanitize user input properly, tt_news is vulnerable to insecure unserialize. Solution: An updated version 3.5.2 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/download/tt_news/3.5.2/t3x/. Users of the extension are advised to update the extension as soon as possible. Credits: Credits go to Pascal Jungblut who discovered and reported this issue. - --- Henri Salo -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iEYEARECAAYFAlQJZm4ACgkQXf6hBi6kbk96fQCfa6PcsVH0CUH+k4xSwrElxPK9 v+kAoKxoNWuztBqkCUbVutnKyXDwMQJE =iHog -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ