Lucene search

K
mageiaGentoo FoundationMGASA-2014-0469
HistoryNov 21, 2014 - 3:44 p.m.

Updated php-smarty packages fix security vulnerability

2014-11-2115:44:16
Gentoo Foundation
advisories.mageia.org
10

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.048 Low

EPSS

Percentile

92.7%

Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by “{literal}<{/literal}script language=php>” in a template (CVE-2014-8350).

OSVersionArchitecturePackageVersionFilename
Mageia4noarchphp-smarty< 3.1.21-1php-smarty-3.1.21-1.mga4

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.048 Low

EPSS

Percentile

92.7%