1
Candidate: CVE-2014-3945
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3945
5
http://www.openwall.com/lists/oss-security/2014/06/03/2
6
http://www.debian.org/security/2014/dsa-2942
7
http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001/
9
The Authentication component in TYPO3 before 6.2, when salting for password
10
hashing is disabled, does not require knowledge of the cleartext password
11
if the password hash is known, which allows remote attackers to bypass
12
authentication and gain access to the backend by leveraging knowledge of a
17
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=749215
23
upstream_typo3-src: released (4.5.34+dfsg1-1)
24
lucid_typo3-src: ignored (reached end-of-life)
25
precise_typo3-src: ignored (reached end-of-life)
26
precise/esm_typo3-src: DNE (precise was needed)
27
saucy_typo3-src: ignored (reached end-of-life)
28
trusty_typo3-src: needed
29
utopic_typo3-src: not-affected (4.5.34+dfsg1-1)
30
vivid_typo3-src: not-affected (4.5.34+dfsg1-1)
31
vivid/stable-phone-overlay_typo3-src: DNE
32
vivid/ubuntu-core_typo3-src: DNE
35
yakkety_typo3-src: DNE