Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2009-0255 | First vendor Publication | 2009-01-22 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | |||
---|---|---|---|
Overall CVSS Score | 7.5 | ||
Base Score | 7.5 | Environmental Score | 7.5 |
impact SubScore | 3.6 | Temporal Score | 7.5 |
Exploitabality Sub Score | 3.9 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | None | Availability Impact | None |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The System extension Install tool in TYPO3 4.0.0 through 4.0.9, 4.1.0 through 4.1.7, and 4.2.0 through 4.2.3 creates the encryption key with an insufficiently random seed, which makes it easier for attackers to crack the key. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0255 |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-59 | Session Credential Falsification through Prediction |
CAPEC-112 | Brute Force |
CAPEC-281 | Analytic Attacks |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-330 | Use of Insufficiently Random Values |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-02-13 | Name : FreeBSD Ports: typo3 File : nvt/freebsd_typo31.nasl |
2009-02-02 | Name : Debian Security Advisory DSA 1711-1 (typo3-src) File : nvt/deb_1711_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
51536 | TYPO3 System Extension Install Tool Encryption Key Random Seed Weakness TYPO3 contains a flaw that may allow a malicious user to crack its encryption key. The System Extension Install Tool creates the key using an insufficiently random seed. It is possible that the flaw may allow the key to be compromised resulting in a loss of confidentiality. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-02-09 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_653606e9f6ac11dd94d90030843d3802.nasl - Type : ACT_GATHER_INFO |
2009-01-27 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1711.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:12:26 |
|
2024-11-28 12:18:08 |
|
2024-02-14 21:28:19 |
|
2021-05-04 12:09:03 |
|
2021-04-22 01:09:23 |
|
2020-05-23 00:23:15 |
|
2017-08-08 09:24:39 |
|
2016-04-26 18:34:42 |
|
2014-02-17 10:48:31 |
|
2013-05-10 23:42:59 |
|