Date: Tue, 9 Feb 2016 17:01:02 +0000 (UTC) From: Mark Felder <feld@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r408579 - head/security/vuxml Message-ID: <201602091701.u19H12pg088884@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: feld Date: Tue Feb 9 17:01:02 2016 New Revision: 408579 URL: https://svnweb.freebsd.org/changeset/ports/408579 Log: Document net-mgmt/xymon-server vulnerabilities MFH: 2016Q1 Security: CVE-2016-2054 Security: CVE-2016-2055 Security: CVE-2016-2056 Security: CVE-2016-2057 Security: CVE-2016-2058 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Feb 9 16:43:33 2016 (r408578) +++ head/security/vuxml/vuln.xml Tue Feb 9 17:01:02 2016 (r408579) @@ -58,6 +58,48 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="1cecd5e0-c372-11e5-96d6-14dae9d210b8"> + <topic>xymon-server -- multiple vulnerabilities</topic> + <affects> + <package> + <name>xymon-server</name> + <range><lt>4.3.25</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>J.C. Cleaver reports reports:</p> + <blockquote cite="http://lists.xymon.com/pipermail/xymon/2016-February/042986.html"> + <ul> + <li><p>CVE-2016-2054: Buffer overflow in xymond handling of + "config" command</p></li> + <li><p> CVE-2016-2055: Access to possibly confidential files + in the Xymon configuration directory</p></li> + <li><p>CVE-2016-2056: Shell command injection in the + "useradm" and "chpasswd" web applications</p></li> + <li><p>CVE-2016-2057: Incorrect permissions on IPC queues + used by the xymond daemon can bypass IP access filtering</p></li> + <li><p>CVE-2016-2058: Javascript injection in "detailed status + webpage" of monitoring items; XSS vulnerability via malformed + acknowledgment messages</p></li> + </ul> + </blockquote> + </body> + </description> + <references> + <url>http://lists.xymon.com/pipermail/xymon/2016-February/042986.html</url> + <cvename>CVE-2016-2054</cvename> + <cvename>CVE-2016-2055</cvename> + <cvename>CVE-2016-2056</cvename> + <cvename>CVE-2016-2057</cvename> + <cvename>CVE-2016-2058</cvename> + </references> + <dates> + <discovery>2016-01-19</discovery> + <entry>2016-02-09</entry> + </dates> + </vuln> + <vuln vid="85eb4e46-cf16-11e5-840f-485d605f4717"> <topic>php -- pcre vulnerability</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201602091701.u19H12pg088884>