Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 17 Jun 2015 00:24:46 +0000 (UTC)
From:      Xin LI <delphij@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r389894 - head/security/vuxml
Message-ID:  <201506170024.t5H0OkD2003817@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: delphij
Date: Wed Jun 17 00:24:46 2015
New Revision: 389894
URL: https://svnweb.freebsd.org/changeset/ports/389894

Log:
  Document testdisk multiple vulnerabilities.
  
  PR:		ports/200250
  Submitted by:	Jason Unovitch

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Wed Jun 17 00:22:59 2015	(r389893)
+++ head/security/vuxml/vuln.xml	Wed Jun 17 00:24:46 2015	(r389894)
@@ -57,6 +57,46 @@ Notes:
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="c67069dc-0986-11e5-bb90-002590263bf5">
+    <topic>testdisk -- buffer overflow with malicious disk image</topic>
+    <affects>
+      <package>
+	<name>testdisk</name>
+	<range><lt>7.0</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>CGSecurity TestDisk Changelog reports:</p>
+	<blockquote cite="http://www.cgsecurity.org/wiki/TestDisk_7.0_Release">;
+	  <p>Various fix including security fix, thanks to:</p>
+	  <ul>
+	    <li><p>Coverity scan (Static Analysis of source code)</p></li>
+	    <li><p>afl-fuzz (security-oriented fuzzer).</p></li>
+	    <li><p>Denis Andzakovic from Security Assessment for reporting an
+	       exploitable Stack Buffer Overflow.</p></li>
+	  </ul>
+	</blockquote>
+	<p>Denis Andzakovic reports:</p>
+	<blockquote cite="http://www.security-assessment.com/files/documents/advisory/Testdisk%20Check_OS2MB%20Stack%20Buffer%20Overflow%20-%20Release.pdf">;
+	  <p>A buffer overflow is triggered within the software when a malicious
+	    disk image is attempted to be recovered. This may be leveraged by an
+	    attacker to crash TestDisk and gain control of program execution. An
+	    attacker would have to coerce the victim to run TestDisk against
+	    their malicious image.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>http://www.cgsecurity.org/wiki/TestDisk_7.0_Release</url>;
+      <url>http://www.security-assessment.com/files/documents/advisory/Testdisk%20Check_OS2MB%20Stack%20Buffer%20Overflow%20-%20Release.pdf</url>;
+    </references>
+    <dates>
+      <discovery>2015-04-30</discovery>
+      <entry>2015-06-16</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="25e0593d-13c0-11e5-9afb-3c970e169bc2">
     <topic>tomcat -- multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201506170024.t5H0OkD2003817>