Hello Nico!
I received your message. Thank you!

Andy Smith <[email protected]>

2009/1/26 Nico Golde <[email protected]>

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> - ------------------------------------------------------------------------
> Debian Security Advisory DSA-1711-1                  [email protected]
> http://www.debian.org/security/                               Nico Golde
> January 26, 2009                      http://www.debian.org/security/faq
> - ------------------------------------------------------------------------
>
> Package        : typo3-src
> Vulnerability  : several
> Problem type   : remote
> Debian-specific: no
> CVE ID         : CVE-2009-0255 CVE-2009-0256 CVE-2009-0257 CVE-2009-0258
> Debian Bug     : 512608
> BugTraq ID     : 33376
>
> Several remotely exploitable vulnerabilities have been discovered in the
> TYPO3 web content management framework.  The Common Vulnerabilities and
> Exposures project identifies the following problems:
>
> CVE-2009-0255
>    Chris John Riley discovered that the TYPO3-wide used encryption key is
>    generated with an insufficiently random seed resulting in low entropy
>    which makes it easier for attackers to crack this key.
>
> CVE-2009-0256
>    Marcus Krause discovered that TYPO3 is not invalidating a supplied
> session
>    on authentication which allows an attacker to take over a victims
>    session via a session fixation attack.
>
> CVE-2009-0257
>    Multiple cross-site scripting vulnerabilities allow remote attackers to
>    inject arbitrary web script or HTML via various arguments and user-
>    supplied strings used in the indexed search system extension, adodb
>    extension test scripts or the workspace module.
>
> CVE-2009-0258
>    Mads Olesen discovered a remote command injection vulnerability in
>    the indexed search system extension which allows attackers to
>    execute arbitrary code via a crafted file name which is passed
>    unescaped to various system tools that extract file content for
>    the indexing.
>
>
> Because of CVE-2009-0255, please make sure that besides installing
> this update, you also create a new encryption key after the
> installation.
>
> For the stable distribution (etch) these problems have been fixed in
> version 4.0.2+debian-7.
>
> For the unstable distribution (sid) these problems have been fixed in
> version 4.2.5-1.
>
> We recommend that you upgrade your TYPO3 packages.
>
> Upgrade instructions
> - --------------------
>
> wget url
>        will fetch the file for you
> dpkg -i file.deb
>        will install the referenced file.
>
> If you are using the apt-get package manager, use the line for
> sources.list as given below:
>
> apt-get update
>        will update the internal database
> apt-get upgrade
>        will install corrected packages
>
> You may use an automated update by adding the resources from the
> footer to the proper configuration.
>
>
> Debian GNU/Linux 4.0 alias etch
> - -------------------------------
>
> Source archives:
>
>
> http://security.debian.org/pool/updates/main/t/typo3-src/typo3-src_4.0.2+debian.orig.tar.gz
>    Size/MD5 checksum:  7683527 be509391b0e4d24278c14100c09dc673
>
> http://security.debian.org/pool/updates/main/t/typo3-src/typo3-src_4.0.2+debian-7.diff.gz
>    Size/MD5 checksum:    23596 344f6b5ada56d361e274556d6d7eaf99
>
> http://security.debian.org/pool/updates/main/t/typo3-src/typo3-src_4.0.2+debian-7.dsc
>    Size/MD5 checksum:      610 6b99cc9acd82ec6010a38006910169c9
>
> Architecture independent packages:
>
>
> http://security.debian.org/pool/updates/main/t/typo3-src/typo3_4.0.2+debian-7_all.deb
>    Size/MD5 checksum:    76924 33b4077e99038121aa5667a3a166d99e
>
> http://security.debian.org/pool/updates/main/t/typo3-src/typo3-src-4.0_4.0.2+debian-7_all.deb
>    Size/MD5 checksum:  7691182 f5c8ecbf93c7af50b29b5ded8f455b75
>
>
>  These files will probably be moved into the stable distribution on
>  its next update.
>
> -
> ---------------------------------------------------------------------------------
> For apt-get: deb http://security.debian.org/ stable/updates main
> For dpkg-ftp: 
> ftp://security.debian.org/debian-securitydists/stable/updates/main
> Mailing list: [email protected]
> Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.9 (GNU/Linux)
>
> iQEcBAEBAgAGBQJJfiIoAAoJEL97/wQC1SS+Zy4IAIccGZx8Hc/kHEl907UC8sJ2
> 72Cs7PSQLsB4z9fRbLyYx2Hyy5Zz+4aAOeRHO3Oy+jzJyjidqvrzdrxN8zd0uhTV
> UZGwRdEqPVO1fNCxVbmpY4EvcctaYpDSEajqKAcLuypyCTPmZ215AJCOx5PeT2QH
> aGUK8ZTeaVWhi3P9hIavDoh7bi/MfoobBBNxmIykDIls2okww7C318Q9WTlaSULq
> e0xfc+4m8J8FXjZw2nlmuyreY35gc67nga/nwA/8xCI5lnoWm72T9/54pOLLOh9g
> 2qee3i2UOEqMJxwpFbQJ2UlcvWcG5FeO+lE2TGXqRaPuzdOqslr3tqa0Ffb7N3Y=
> =SyTo
> -----END PGP SIGNATURE-----
>
>
> --
> To UNSUBSCRIBE, email to [email protected]
> with a subject of "unsubscribe". Trouble? Contact
> [email protected]
>
>


-- 
Andy Smith

Reply via email to