Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 21 Apr 2014 01:36:52 -0400 (EDT)
From: cve-assign@...re.org
To: pedrib@...il.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: Remote code execution in Pimcore CMS

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> It's all the same flaw and the same attack methodology

Probably "attack methodology" wasn't the best phrase to use in the
http://openwall.com/lists/oss-security/2014/04/19/5 post because there
might be multiple common definitions.

The currently available exploit information is that an attack against
versions 1.4.9 to 2.0.0 (inclusive) can use
Zend_Pdf_ElementFactory_Proxy.

Also, an attack against versions 1.4.9 to 2.1.0 (inclusive) can use
Zend_Http_Response_Stream.

The details of a successful attack are not identical for these two
sets of versions. CVE's practice here is to assign two different IDs:

  1.4.9 to 2.0.0: Zend_Pdf_ElementFactory_Proxy = CVE-2014-2921
  1.4.9 to 2.1.0: Zend_Http_Response_Stream =     CVE-2014-2922

The impacts are also different but a difference in impact does not, by
itself, affect the number of CVE IDs. The detailed reason for why
there are different sets of affected versions (e.g., a code change in
2.0.1 to enforce use of certain PHP versions, with some PHP versions
not allowing a malicious.php\0 filename) also does not affect the
number of CVE IDs in this case.

Each CVE depends on the unserialize problem in the context of whether
the version-enforcement code is present or absent.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTVK2rAAoJEKllVAevmvmsmqEIALm75zXacwRz6P+tdvvHrrUw
DjeKcGx6ursnX2N3skFLDE0TBA9zZ3lnAzl26pOuRR6rDsAyHb3blWxb1Wd1GTQk
vzKTU4cBNUzhKjBn0v+l/fepvV1JH7uPVJoI+dUU4wV0Y0z79g1hNKrEOshfetSr
SDLCfh7Qxk9bCIWkJ2jJ+e1iiiF75fd132/skMaZWth/aO8/sh6M9H9T5Re51ikE
UymvKFElYjHRnH5MMBCDxDu9JOR/E82BBxREy3pz7b4iQXwuuBc+gL5KXXe+ZLwf
NsaJ25LjvP5Fe+OYoGcPVKN9d8GehAD8Yj0vwZ69Kn6f0yqijBwDwhnDkBLPl54=
=+ro7
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.