Category Archives: Security

Security

CVE-2017-7319

A vulnerability in the Linux kernel package 3.16.0-28 on Ubuntu 14.04 LTS allows any user to send a SIGIO signal to any process. If the process does not catch or ignore the signal, it will exit.

CVE-2017-7286

The Linux kernel package 3.16.0-28 on Ubuntu 14.04 LTS mishandles a series of mmap system calls for /dev/zero with different starting addresses, with a stated impact of “allowing for a local user to possibly gain root access,” aka an “inode integer overflow.”

SQL Injection in extension "Event management and registration" (sf_event_mgt)

Release Date: April 10, 2017

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: version 1.8.0 and below

Vulnerability Type: SQL Injection

Severity: Critical

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:F/RL:O/RC:C (What’s that?)

CVE: not assigned yet

Problem Description: The extension fails to properly sanitize user input and is susceptible to SQL Injection.

Solution: An updated version 1.8.1 is available from the TYPO3 Extension Manager and at https://typo3.org/extensions/repository/download/sf_event_mgt/1.8.1/t3x/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Torben Hansen who discovered and reported the vulnerability.

Note: In case you extended the controller of the sf_event_mgt extension in your own extensions, be sure to apply the fix there too.

 

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.

SQL Injection in extension "News system" (news)

Release Date: April 10, 2017

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: versions 3.2.6 and below, 4.0.0 to 4.3.0 and 5.0.0 to 5.3.2

Vulnerability Type: SQL Injection

Severity: Critical

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:F/RL:O/RC:C (What’s that?)

CVE: not assigned yet

Problem Description: The extension fails to properly sanitize user input and is susceptible to SQL Injection.

Solution: The updated versions 3.2.7 and 5.3.3 are available from the TYPO3 Extension Manager and at https://typo3.org/extensions/repository/view/news. Users of the extension are advised to update the extension as soon as possible. The updated version 4.3.1 will be available from version control or via composer.

Credits: Credits go to Ambionics Security who discovered and reported the vulnerability.

Note: In case you extended the controller of the News extension in your own extensions, be sure to apply the fix there too.

 

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.