Lucene search

K
debianDebianDEBIAN:DLA-3262-1:9D56B
HistoryJan 05, 2023 - 9:00 p.m.

[SECURITY] [DLA 3262-1] smarty3 security update

2023-01-0521:00:54
lists.debian.org
5

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

4.9 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

0.002 Low

EPSS

Percentile

53.5%


Debian LTS Advisory DLA-3262-1 [email protected]
https://www.debian.org/lts/security/ Chris Lamb
January 05, 2023 https://wiki.debian.org/LTS


Package : smarty3
Version : 3.1.33+20180830.1.3a78a21f+selfpack1-1+deb10u2
CVE ID : CVE-2018-25047
Debian Bug : 1019897

It was discovered that there was a potential cross-site scripting
vulnerability in smarty3, a widely-used PHP templating engine.

For Debian 10 buster, this problem has been fixed in version
3.1.33+20180830.1.3a78a21f+selfpack1-1+deb10u2.

We recommend that you upgrade your smarty3 packages.

For the detailed security status of smarty3 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/smarty3

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

OSVersionArchitecturePackageVersionFilename
Debian10allsmarty3< 3.1.33+20180830.1.3a78a21f+selfpack1-1+deb10u2smarty3_3.1.33+20180830.1.3a78a21f+selfpack1-1+deb10u2_all.deb

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

4.9 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

0.002 Low

EPSS

Percentile

53.5%