Date: Wed, 30 Apr 2008 23:09:33 -0700 From: "Mark D. Foster" <mark@foster.cc> To: FreeBSD-gnats-submit@FreeBSD.org Subject: ports/123285: vuxml update: vulnerability in mt-daapd < 0.2.4.2 Message-ID: <48195E9D.8040103@foster.cc> Resent-Message-ID: <200805010620.m416K1ei068812@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 123285 >Category: ports >Synopsis: vuxml update: vulnerability in mt-daapd < 0.2.4.2 >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: update >Submitter-Id: current-users >Arrival-Date: Thu May 01 06:20:01 UTC 2008 >Closed-Date: >Last-Modified: >Originator: Mark Foster >Release: FreeBSD 5.5-RELEASE-p18 i386 >Organization: >Environment: System: FreeBSD franco.foster.dmz 5.5-RELEASE-p18 FreeBSD 5.5-RELEASE-p18 #25: Tue Jan 15 08:43:22 PST 2008 root@franco.foster.dmz:/usr/obj/usr/src/sys/FRANCO1 i386 >Description: Add information about CVS-2008-1771 and update earlier entry for mt-daapd to add addl. references. >How-To-Repeat: >Fix: --- vuln.xml.patch1 begins here --- --- vuln.xml.old Wed Apr 30 22:28:10 2008 +++ vuln.xml Wed Apr 30 22:35:16 2008 @@ -34,6 +34,33 @@ --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="821f0b2a-173f-11dd-8447-00b0d07e6c7e"> + <topic>mt-daapd -- Integer overflow</topic> + <affects> + <package> + <name></name> + <range><lt>0.2.4.2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>FrSIRT reports:</p> + <blockquote cite="http://www.frsirt.com/english/advisories/2008/1303"> + <p>A vulnerability has been identified in mt-daapd (Multi-Threaded DAAP Daemon), which could be exploited by remote attackers to cause a denial of service or compromise an affected system. This issue is caused by a buffer overflow error in the "ws_getpostvars()" [src/webserver.c] function when processing a negative "Content-Length:" header value, which could be exploited by remote unauthenticated attackers to crash an affected application or execute arbitrary code.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2008-1771</cvename> + <url>http://secunia.com/advisories/29917</url> + <url>http://www.frsirt.com/english/advisories/2008/1303</url> + </references> + <dates> + <discovery>2008-04-21</discovery> + <entry>2008-04-30</entry> + </dates> + </vuln> + <vuln vid="12b336c6-fe36-11dc-b09c-001c2514716c"> <topic>mozilla -- multiple vulnerabilities</topic> <affects> @@ -2167,10 +2194,12 @@ </description> <references> <cvename>CVE-2007-5824</cvename> + <cvename>CVE-2007-5825</cvename> </references> <dates> <discovery>2007-11-05</discovery> <entry>2007-11-12</entry> + <modified>2008-04-30</modified> </dates> </vuln> --- vuln.xml.patch1 ends here --- -- Said one park ranger, 'There is considerable overlap between the intelligence of the smartest bears and the dumbest tourists.' Mark D. Foster, CISSP <mark@foster.cc> http://mark.foster.cc/ >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?48195E9D.8040103>