|
Message-ID: <Pine.GSO.4.64.1009281713570.24337@faron.mitre.org> Date: Tue, 28 Sep 2010 17:19:53 -0400 (EDT) From: "Steven M. Christey" <coley@...us.mitre.org> To: Josh Bressers <bressers@...hat.com> cc: oss-security@...ts.openwall.com Subject: Re: CVE requests: POE::Component::IRC, Alien Arena, Babiloo, Typo3, abcm2ps, ModSecurity, Linux kernel Here are the CVEs for TYPO3: http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-012/ This is a good microcosm of CVE's main content decisions in action (i.e. SPLIT on different versions or different bug types) along with reading between the lines. You see a lot of vulns with the same type, but many of them are SPLIT because of different versions. Some issues have the same label, but it's pretty clear that they're really talking about different vuln types that happen to have the same consequence, so they're SPLIT. When all is said and done, only 2 XSS issues are MERGED in this case. - Steve CVE-2010-3659 ------------- Multiple XSS (subcomponent #1: Backend) - fixed: 4.1.14, 4.2.13, 4.3.4, 4.4.1 XSS (subcomponent #1: Backend) - fixed: 4.1.14, 4.2.13, 4.3.4, 4.4.1 - in Extension manager CVE-2010-3660 ------------- Open Redirection (subcomponent #1: Backend) - fixed: 4.1.14, 4.2.13, 4.3.4, 4.4.1 CVE-2010-3661 ------------- SQL Injection (subcomponent #1: Backend) - fixed: 4.1.14, 4.2.13, 4.3.4, 4.4.1 CVE-2010-3662 ------------- Arbitrary Code Execution (subcomponent #1: Backend) - fixed: 4.1.14, 4.2.13, 4.3.4 or 4.4.1 - Note: CVE calls this "unrestricted file upload" CVE-2010-3663 ------------- Information Disclosure (subcomponent #1: Backend) - fixed: 4.1.14, 4.2.13, 4.3.4 or 4.4.1 - error message infoleak of path to web root CVE-2010-3664 ------------- Information Disclosure (subcomponent #1: Backend) - fixed: 4.1.14, 4.2.13, 4.3.4, 4.4.1 - SPLIT: reading contents of arbitrary files by "forging a special request parameter." Issue is probably path traversal, thus different vuln type than "error message infoleak" CVE-2010-3665 ------------- Insecure Randomness (subcomponent #2: User authentication) - fixed: 4.1.14, 4.2.13, 4.3.4, 4.4.1 CVE-2010-3666 ------------- Spam Abuse (subcomponent #3: Frontend) - fixed: 4.1.14, 4.2.13, 4.3.4, 4.4.1 - could be same vuln type as "forging a special request" issue in Backend, but that one is probably path traversal CVE-2010-3667 ------------- Header Injection (subcomponent #3: Frontend) - fixed: 4.1.14, 4.2.13, 4.3.4, 4.4.1 CVE-2010-3668 ------------- Open Redirection (subcomponent #4: Frontend Login) - fixed: 4.2.13, 4.3.4, 4.4.1 - SPLIT: different versions than open redir in Backend CVE-2010-3669 ------------- XSS (subcomponent #4: Frontend Login) - fixed: 4.2.13, 4.3.4, 4.4.1 - SPLIT: different versions than XSS in Backend CVE-2010-3670 ------------- Insecure Randomness (subcomponent #4: Frontend Login) - fixed: 4.3.4, 4.4.1 - SPLIT: different versions than insecure randomness in User authentication CVE-2010-3671 ------------- Broken Authentication and Session Management (subcomponent #5: Install Tool) - fixed: 4.1.14, 4.2.13, 4.3.4, 4.4.1 - Note: CVE calls this session fixation CVE-2010-3672 ------------- XSS (subcomponent #6: FLUID Templating Engine) - fixed: 4.3.4, 4.4.1 - SPLIT: different versions than XSS in Backend and Frontend Login CVE-2010-3673 ------------- Information Disclosure (subcomponent #7: Mailing API) - fixed: 4.2.13, 4.3.4, 4.4.1 - SPLIT: different 'type' of Information Disclosure than others CVE-2010-3674 ------------- XSS (subcomponent #8: Introduction Package) - fixed: 4.4.1 - SPLIT: different versions than XSS in other components
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.