Date: Wed, 9 Oct 2019 12:31:58 +0000 (UTC) From: =?UTF-8?Q?Vin=c3=adcius_Zavam?= <egypcio@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r514147 - head/security/vuxml Message-ID: <201910091231.x99CVw2h027136@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: egypcio Date: Wed Oct 9 12:31:58 2019 New Revision: 514147 URL: https://svnweb.freebsd.org/changeset/ports/514147 Log: security/vuxml: add CVE-2011-2767 [www/mod_perl2] https://nvd.nist.gov/vuln/detail/CVE-2011-2767 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Wed Oct 9 12:28:26 2019 (r514146) +++ head/security/vuxml/vuln.xml Wed Oct 9 12:31:58 2019 (r514147) @@ -58,6 +58,42 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="c360d057-ea8b-11e9-859b-b885849ded8e"> + <topic>mod_perl2 -- execute arbitrary Perl code</topic> + <affects> + <package> + <name>ap24-mod_perl2</name> + <range><lt>2.0.11,3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>mod_perl2 2.0.11 fixes Arbitrary Perl code execution in the context + of the user account via a user-owned .htaccess.</p> + <blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2011-2767"> + <p>mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary + Perl code by placing it in a user-owned .htaccess file, because + (contrary to the documentation) there is no configuration option + that permits Perl code for the administrator's control of HTTP + request processing without also permitting unprivileged users + to run Perl code in the context of the user account that runs + Apache HTTP Server processes.</p> + </blockquote> + </body> + </description> + <references> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2767</url> + <url>https://www.securityfocus.com/bid/105195</url> + <url>https://access.redhat.com/errata/RHSA-2018:2826</url> + <url>https://bugs.debian.org/644169</url> + <url>https://usn.ubuntu.com/3825-2/</url> + </references> + <dates> + <discovery>2011-07-19</discovery> + <entry>2019-10-09</entry> + </dates> + </vuln> + <vuln vid="791e8f79-e7d1-11e9-8b31-206a8a720317"> <topic>Xpdf -- Multiple Vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201910091231.x99CVw2h027136>