Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 22 Jan 2013 21:38:10 -0500 (EST)
From: cve-assign@...re.org
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: Re: CVE request for Movable Type

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>> Movable Type 4.38 has been released ...

>Please use CVE-2013-0209 for this issue.

We decided to keep CVE-2013-0209 instead of the other CVE that was
reserved for this through MITRE a while ago. Also, we decided to cover
this with one CVE entry even though the various issues discussed ("OS
command injection and SQL injection" in the vendor advisory, and "perl
code injection" in the researcher's advisory) can perhaps be
interpreted in other ways.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0209
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-6315

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (SunOS)

iQEcBAEBAgAGBQJQ/0tEAAoJEGvefgSNfHMdTdEH/ReXfWbrwCYE97+W9y8uAHyW
+EfPHRUmEfmIOfH61IakvsHp1RbBCkoLakZkI4fU0mXoIhuD1pNT5wpj/G+EIzs4
pHDLm3qxI7iqe0r2gG747RDuAVwHxbxVqbwJqlarD9Dct6lTIrb5h5tXyL0j08ph
SHYl3JoJeBzbImJmwMLdI37dRYPXNaLbB4tt7CbwX6xeLDJ3RzxmpYUuw6UKq9ZM
dJbDNLFePUQsQDofrgv77ZRn6A+92TKMI9ecA7abcAs4OTgIQ24TxwA+gSi9n3rp
f581/R4oR3Qz5rRnYlWtoMNynmFxIH5vFfWJAAkZ7v381Hr51a4YCIvTo1PiU0g=
=ys3d
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.