Date: Mon, 6 Oct 2014 19:09:35 +0000 (UTC) From: Olli Hauer <ohauer@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r370209 - head/security/vuxml Message-ID: <201410061909.s96J9Ztd050810@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: ohauer Date: Mon Oct 6 19:09:34 2014 New Revision: 370209 URL: https://svnweb.freebsd.org/changeset/ports/370209 QAT: https://qat.redports.org/buildarchive/r370209/ Log: - document bugzilla security issues Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Mon Oct 6 19:04:23 2014 (r370208) +++ head/security/vuxml/vuln.xml Mon Oct 6 19:09:34 2014 (r370209) @@ -57,6 +57,55 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="b6587341-4d88-11e4-aef9-20cf30e32f6d"> + <topic>Bugzilla multiple security issues</topic> + <affects> + <package> + <name>bugzilla44</name> + <range><lt>4.4.6</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Bugzilla Security Advisory</p> + <blockquote cite="http://www.bugzilla.org/security/4.0.14/"> + <h5>Unauthorized Account Creation</h5> + <p>An attacker creating a new Bugzilla account can override certain + parameters when finalizing the account creation that can lead to the + user being created with a different email address than originally + requested. The overridden login name could be automatically added + to groups based on the group's regular expression setting.</p> + <h5>Cross-Site Scripting</h5> + <p>During an audit of the Bugzilla code base, several places + were found where cross-site scripting exploits could occur which + could allow an attacker to access sensitive information.</p> + <h5>Information Leak</h5> + <p>If a new comment was marked private to the insider group, and a flag + was set in the same transaction, the comment would be visible to + flag recipients even if they were not in the insider group.</p> + <h5>Social Engineering</h5> + <p>Search results can be exported as a CSV file which can then be + imported into external spreadsheet programs. Specially formatted + field values can be interpreted as formulas which can be executed + and used to attack a user's computer.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2014-1572</cvename> + <cvename>CVE-2014-1573</cvename> + <cvename>CVE-2014-1571</cvename> + <url>https://bugzilla.mozilla.org/show_bug.cgi?id=1074812</url> + <url>https://bugzilla.mozilla.org/show_bug.cgi?id=1075578</url> + <url>https://bugzilla.mozilla.org/show_bug.cgi?id=1064140</url> + <url>https://bugzilla.mozilla.org/show_bug.cgi?id=1054702</url> + </references> + <dates> + <discovery>2014-10-06</discovery> + <entry>2014-10-06</entry> + </dates> + </vuln> + <vuln vid="81e2b308-4a6c-11e4-b711-6805ca0b3d42"> <topic>rt42 -- vulnerabilities related to shellshock</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201410061909.s96J9Ztd050810>