Date: Tue, 19 Nov 2013 23:11:40 +0000 (UTC) From: "Timur I. Bakeyev" <timur@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r334362 - head/security/vuxml Message-ID: <201311192311.rAJNBebw018586@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: timur Date: Tue Nov 19 23:11:40 2013 New Revision: 334362 URL: http://svnweb.freebsd.org/changeset/ports/334362 Log: Add entries about CVE-2013-4475 and CVE-2013-4476 for net/samba* ports. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Nov 19 23:08:44 2013 (r334361) +++ head/security/vuxml/vuln.xml Tue Nov 19 23:11:40 2013 (r334362) @@ -51,6 +51,87 @@ Note: Please add new entries to the beg --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="479efd57-516e-11e3-9b62-000c292e4fd8"> + <topic>samba -- Private key in key.pem world readable</topic> + <affects> + <package> + <name>samba4</name> + <range><gt>4.0.*</gt><lt>4.0.11</lt></range> + </package> + <package> + <name>samba41</name> + <range><gt>4.1.*</gt><lt>4.1.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Samba project reports:</p> + <blockquote cite="http://www.samba.org/samba/security/CVE-2013-4476"> + <p>Samba 4.0.x before 4.0.11 and 4.1.x before 4.1.1, when LDAP or HTTP is + provided over SSL, uses world-readable permissions for a private key, + which allows local users to obtain sensitive information by reading the + key file, as demonstrated by access to the local filesystem on an AD + domain controller.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2013-4476</cvename> + <url>http://www.samba.org/samba/security/CVE-2013-4476</url> + </references> + <dates> + <discovery>2013-06-12</discovery> + <entry>2013-11-19</entry> + </dates> + </vuln> + + <vuln vid="a4f08579-516c-11e3-9b62-000c292e4fd8"> + <topic>samba -- ACLs are not checked on opening an alternate data stream on a file or directory</topic> + <affects> + <package> + <name>samba34</name> + <range><gt>0</gt></range> + </package> + <package> + <name>samba35</name> + <range><gt>0</gt></range> + </package> + <package> + <name>samba36</name> + <range><gt>3.6.*</gt><lt>3.6.20</lt></range> + </package> + <package> + <name>samba4</name> + <range><gt>4.0.*</gt><lt>4.0.11</lt></range> + </package> + <package> + <name>samba41</name> + <range><gt>4.1.*</gt><lt>4.1.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Samba project reports:</p> + <blockquote cite="http://www.samba.org/samba/security/CVE-2013-4475"> + <p>Samba versions 3.2.0 and above (all versions of 3.2.x, 3.3.x, + 3.4.x, 3.5.x, 3.6.x, 4.0.x and 4.1.x) do not check the underlying + file or directory ACL when opening an alternate data stream.</p> + <p>According to the SMB1 and SMB2+ protocols the ACL on an underlying + file or directory should control what access is allowed to alternate + data streams that are associated with the file or directory.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2013-4475</cvename> + <url>http://www.samba.org/samba/security/CVE-2013-4475</url> + </references> + <dates> + <discovery>2013-06-12</discovery> + <entry>2013-11-19</entry> + </dates> + </vuln> + <vuln vid="94b6264a-5140-11e3-8b22-f0def16c5c1b"> <topic>nginx -- Request line parsing vulnerability</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201311192311.rAJNBebw018586>