From owner-svn-ports-all@FreeBSD.ORG Sat Dec 29 19:53:47 2012 Return-Path: Delivered-To: svn-ports-all@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id ED248DD; Sat, 29 Dec 2012 19:53:47 +0000 (UTC) (envelope-from rea@FreeBSD.org) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) by mx1.freebsd.org (Postfix) with ESMTP id D10728FC0A; Sat, 29 Dec 2012 19:53:47 +0000 (UTC) Received: from svn.freebsd.org (svn.FreeBSD.org [8.8.178.70]) by svn.freebsd.org (8.14.5/8.14.5) with ESMTP id qBTJrlBV038344; Sat, 29 Dec 2012 19:53:47 GMT (envelope-from rea@svn.freebsd.org) Received: (from rea@localhost) by svn.freebsd.org (8.14.5/8.14.5/Submit) id qBTJrlY4038343; Sat, 29 Dec 2012 19:53:47 GMT (envelope-from rea@svn.freebsd.org) Message-Id: <201212291953.qBTJrlY4038343@svn.freebsd.org> From: Eygene Ryabinkin Date: Sat, 29 Dec 2012 19:53:47 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r309629 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 29 Dec 2012 19:53:48 -0000 Author: rea Date: Sat Dec 29 19:53:46 2012 New Revision: 309629 URL: http://svnweb.freebsd.org/changeset/ports/309629 Log: VuXML entries for Tomcat: split into three distinct ones They affect different Tomcat versions from 7.x branch, so don't let users of VuXML be fooled on the affected software for each vulnerability. Feature safe: yes Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sat Dec 29 18:41:30 2012 (r309628) +++ head/security/vuxml/vuln.xml Sat Dec 29 19:53:46 2012 (r309629) @@ -192,8 +192,8 @@ Note: Please add new entries to the beg - - tomcat -- multiple vulnerabilities + + tomcat -- bypass of CSRF prevention filter tomcat6 @@ -206,26 +206,48 @@ Note: Please add new entries to the beg -

The Apache Software Foundation reports:

-
-

When using the NIO connector with sendfile and HTTPS enabled, if a - client breaks the connection while reading the response an infinite loop - is entered leading to a denial of service.

-

When using FORM authentication it was possible to bypass the security - constraint checks in the FORM authenticator by appending - "/j_security_check" to the end of the URL if some other component - (such as the Single-Sign-On valve) had called request.setUserPrincipal() - before the call to FormAuthenticator#authenticate().

+

The Apache Software Foundation reports:

+

The CSRF prevention filter could be bypassed if a request was made to a protected resource without a session identifier present in the request.

-
+
- CVE-2012-3546 CVE-2012-4431 + http://tomcat.apache.org/security-6.html + http://tomcat.apache.org/security-7.html + + + 2012-12-04 + 2012-12-04 + +
+ + + tomcat -- denial of service + + + tomcat6 + 6.0.06.0.35 + + + tomcat7 + 7.0.07.0.27 + + + + +

The Apache Software Foundation reports:

+
+

When using the NIO connector with sendfile and HTTPS enabled, if a + client breaks the connection while reading the response an infinite loop + is entered leading to a denial of service.

+
+ +
+ CVE-2012-4534 - http://tomcat.apache.org/security.html http://tomcat.apache.org/security-6.html http://tomcat.apache.org/security-7.html @@ -235,6 +257,42 @@ Note: Please add new entries to the beg
+ + tomcat -- bypass of security constraints + + + tomcat6 + 6.0.06.0.35 + + + tomcat7 + 7.0.07.0.29 + + + + +

The Apache Software Foundation reports:

+
+

When using FORM authentication it was possible to bypass the security + constraint checks in the FORM authenticator by appending + "/j_security_check" to the end of the URL if some other component + (such as the Single-Sign-On valve) had called request.setUserPrincipal() + before the call to FormAuthenticator#authenticate().

+
+ +
+ + CVE-2012-3546 + http://tomcat.apache.org/security-6.html + http://tomcat.apache.org/security-7.html + + + 2012-12-04 + 2012-12-04 + 2012-12-29 + +
+ dns/bind9* -- servers using DNS64 can be crashed by a crafted query