Date: Fri, 5 Sep 2014 10:29:50 +0300 From: Henri Salo <henri@...v.fi> To: oss-security@...ts.openwall.com Cc: TYPO3 Security Team <security@...o3.org> Subject: CVE request: TYPO3-EXT-SA-2014-003 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Can I get 2014 CVE for TYPO3-EXT-SA-2014-003, thanks. http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-003 http://osvdb.org/103258 Release Date: February 12, 2014 Affected Versions: Version 3.5.1 and below Vulnerability Type: Insecure Unserialize Severity: High Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:P/A:C/E:P/RL:O/RC:C Problem Description: Failing to sanitize user input properly, tt_news is vulnerable to insecure unserialize. Solution: An updated version 3.5.2 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/download/tt_news/3.5.2/t3x/. Users of the extension are advised to update the extension as soon as possible. Credits: Credits go to Pascal Jungblut who discovered and reported this issue. - --- Henri Salo -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iEYEARECAAYFAlQJZm4ACgkQXf6hBi6kbk96fQCfa6PcsVH0CUH+k4xSwrElxPK9 v+kAoKxoNWuztBqkCUbVutnKyXDwMQJE =iHog -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.