===================================================================== CERT-Renater Note d'Information No. 2009/VULN490 _____________________________________________________________________ DATE : 02/12/2009 HARDWARE PLATFORM(S) : / OPERATING SYSTEM(S) : Systems running Calendar Base for TYPO3, Direct Mail for TYPO3, [AN] Search it! for TYPO3, kk_downloader for TYPO3, lt_basetag for TYPO3, Trips for TYPO3, simple Glossar for TYPO3, TW Productfinder for TYPO3, DB Integration for TYPO3. ====================================================================== http://lists.typo3.org/pipermail/typo3-announce/2009/000137.html ______________________________________________________________________ Dear users of TYPO3, Security vulnerabilities have been discovered in following third party TYPO3 extensions: "Calendar Base" (cal) "Direct Mail" (direct_mail) "[AN] Search it!" (an_searchit) "Simple download-system with counter and categories" (kk_downloader) "Automatic Base Tags for RealUrl" (lt_basetag) "Trips" (mchtrips) "simple Glossar" (simple_glossar) "TW Productfinder" (tw_productfinder) "DB Integration" (wfqbe) For further information on the issue in extension "Calendar Base" (cal), please read the related advisory TYPO3-SA-2009-019 that was published today: For further information on the issue in extension "Direct Mail" (direct_mail), please read the related advisory TYPO3-SA-2009-018 that was published today: For further information on all CSB (Collective Security Bulletin) issues, please read the related advisory TYPO3-SA-2009-017 that was published today: In general, the TYPO3 Security Team recommends to read the following pages: The TYPO3 Security Cookbook: Make sure you are subscribed to the TYPO3 Announce List: See all TYPO3 security advisories: Regards, Marcus Krause Member of the TYPO3 Security Team -- TYPO3 Security Team homepage: http://typo3.org/teams/security/ E-Mail: security at typo3.org Please note: when replying to this e-mail, please leave the header intact. ====================================================================== ========================================================= Les serveurs de référence du CERT-Renater http://www.urec.fr/securite http://www.cru.fr/securite http://www.renater.fr ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 151 bd de l'Hopital | fax : 01-53-94-20-41 + + 75013 Paris | email: certsvp@renater.fr + =========================================================