English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75096 CVE descriptions
and 39644 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.63361
Category:FreeBSD Local Security Checks
Title:FreeBSD Ports: typo3
Summary:FreeBSD Ports: typo3
Description:The remote host is missing an update to the system
as announced in the referenced advisory.

The following package is affected: typo3

CVE-2009-0255
The System extension Install tool in TYPO3 4.0.0 through 4.0.9, 4.1.0
through 4.1.7, and 4.2.0 through 4.2.3 creates the encryption key with
an insufficiently random seed, which makes it easier for attackers to
crack the key.

CVE-2009-0256
Session fixation vulnerability in the authentication library in TYPO3
4.0.0 through 4.0.9, 4.1.0 through 4.1.7, and 4.2.0 through 4.2.3
allows remote attackers to hijack web sessions via unspecified vectors
related to (1) frontend and (2) backend authentication.

CVE-2009-0257
Multiple cross-site scripting (XSS) vulnerabilities in TYPO3 4.0.0
through 4.0.9, 4.1.0 through 4.1.7, and 4.2.0 through 4.2.3 allow
remote attackers to inject arbitrary web script or HTML via the (1)
name and (2) content of indexed files to the (a) Indexed Search Engine
(indexed_search) system extension
(b) unspecified test scripts in the
ADOdb system extension
and (c) unspecified vectors in the Workspace
module.

CVE-2009-0258
The Indexed Search Engine (indexed_search) system extension in TYPO3
4.0.0 through 4.0.9, 4.1.0 through 4.1.7, and 4.2.0 through 4.2.3
allows remote attackers to execute arbitrary commands via a crafted
filename containing shell metacharacters, which is not properly
handled by the command-line indexer.

Solution:
Update your system with the appropriate patches or
software upgrades.

http://secunia.com/advisories/33617/
http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-001/
http://www.vuxml.org/freebsd/653606e9-f6ac-11dd-94d9-0030843d3802.html
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-0255
Debian Security Information: DSA-1711 (Google Search)
http://www.debian.org/security/2009/dsa-1711
BugTraq ID: 33376
http://www.securityfocus.com/bid/33376
http://secunia.com/advisories/33617
http://secunia.com/advisories/33679
XForce ISS Database: typo3-installtool-weak-security(48132)
http://xforce.iss.net/xforce/xfdb/48132
Common Vulnerability Exposure (CVE) ID: CVE-2009-0256
XForce ISS Database: typo3-library-session-hijacking(48133)
http://xforce.iss.net/xforce/xfdb/48133
Common Vulnerability Exposure (CVE) ID: CVE-2009-0257
XForce ISS Database: typo3-adodb-xss(48137)
http://xforce.iss.net/xforce/xfdb/48137
XForce ISS Database: typo3-indexedsearchengine-xss(48135)
http://xforce.iss.net/xforce/xfdb/48135
XForce ISS Database: typo3-workspace-xss(48136)
http://xforce.iss.net/xforce/xfdb/48136
Common Vulnerability Exposure (CVE) ID: CVE-2009-0258
http://www.openwall.com/lists/oss-security/2009/01/23/4
XForce ISS Database: typo3-indexedsearch-command-execution(48138)
http://xforce.iss.net/xforce/xfdb/48138
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

This is only one of 39644 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.