Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 11 Feb 2009 10:33:34 +0000 (UTC)
From:      Martin Wilke <miwi@FreeBSD.org>
To:        ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   cvs commit: ports/www/typo3 Makefile distinfo
Message-ID:  <200902111033.n1BAXYPG097587@repoman.freebsd.org>

next in thread | raw e-mail | index | archive | help
miwi        2009-02-11 10:33:34 UTC

  FreeBSD ports repository

  Modified files:
    www/typo3            Makefile distinfo 
  Log:
  - Update to 4.2.6
  
  Security update:
  An Information Disclosure vulnerability in jumpUrl mechanism,
  used to track access on web pages and provided files, allows
  a remote attacker to read arbitrary files on a host.
  
  The expected value of a mandatory hash secret, intended to
  invalidate such requests, is exposed to remote users allowing
  them to bypass access control by providing the correct value.
  
  There's no authentication required to exploit this vulnerability.
  The vulnerability allows to read any file, the web server user account
  has access to.
  
  With hat:       secteam
  Security:       http://www.vuxml.org/freebsd/cc47fafe-f823-11dd-94d9-0030843d3802.html
  
  Revision  Changes    Path
  1.25      +1 -2      ports/www/typo3/Makefile
  1.17      +6 -6      ports/www/typo3/distinfo



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200902111033.n1BAXYPG097587>