First published: Thu Jan 22 2009(Updated: )
The System extension Install tool in TYPO3 4.0.0 through 4.0.9, 4.1.0 through 4.1.7, and 4.2.0 through 4.2.3 creates the encryption key with an insufficiently random seed, which makes it easier for attackers to crack the key.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TYPO3 | =4.1.1 | |
TYPO3 | =4.1.0-beta1 | |
TYPO3 | =4.1.6 | |
TYPO3 | =4.2.0 | |
TYPO3 | =4.0.5 | |
TYPO3 | =4.0.3 | |
TYPO3 | =4.2.3 | |
TYPO3 | =4.1.4 | |
TYPO3 | =4.0.4 | |
TYPO3 | =4.2.1 | |
TYPO3 | =4.0.1 | |
TYPO3 | =4.1.7 | |
TYPO3 | =4.1.0 | |
TYPO3 | =4.1.0-rc1 | |
TYPO3 | =4.0.2 | |
TYPO3 | =4.0.7 | |
TYPO3 | =4.0 | |
TYPO3 | =4.2.2 | |
TYPO3 | =4.0.8 | |
TYPO3 | =4.1.3 | |
TYPO3 | =4.0.6 | |
TYPO3 | =4.0.9 | |
TYPO3 | =4.1.5 | |
TYPO3 | =4.1.2 | |
TYPO3 | >=4.0<4.0.10 | |
TYPO3 | >=4.1.0<4.1.8 | |
TYPO3 | >=4.2.0<4.2.4 | |
Debian GNU/Linux | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0255 has a severity rating that indicates it poses a significant risk due to its potential exploitation.
To fix CVE-2009-0255, you should upgrade TYPO3 to version 4.2.4 or later, which addresses this vulnerability.
CVE-2009-0255 affects TYPO3 versions 4.0.0 through 4.0.9, 4.1.0 through 4.1.7, and 4.2.0 through 4.2.3.
The impact of CVE-2009-0255 could allow attackers to potentially crack the encryption key due to an insufficiently random seed.
There are no specific workarounds for CVE-2009-0255, and upgrading the software is the recommended action.