From owner-svn-ports-all@FreeBSD.ORG Tue Nov 19 23:11:40 2013 Return-Path: Delivered-To: svn-ports-all@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id B607CB05; Tue, 19 Nov 2013 23:11:40 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id A43A52504; Tue, 19 Nov 2013 23:11:40 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.7/8.14.7) with ESMTP id rAJNBeRx018587; Tue, 19 Nov 2013 23:11:40 GMT (envelope-from timur@svn.freebsd.org) Received: (from timur@localhost) by svn.freebsd.org (8.14.7/8.14.5/Submit) id rAJNBebw018586; Tue, 19 Nov 2013 23:11:40 GMT (envelope-from timur@svn.freebsd.org) Message-Id: <201311192311.rAJNBebw018586@svn.freebsd.org> From: "Timur I. Bakeyev" Date: Tue, 19 Nov 2013 23:11:40 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r334362 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.16 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 19 Nov 2013 23:11:40 -0000 Author: timur Date: Tue Nov 19 23:11:40 2013 New Revision: 334362 URL: http://svnweb.freebsd.org/changeset/ports/334362 Log: Add entries about CVE-2013-4475 and CVE-2013-4476 for net/samba* ports. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Nov 19 23:08:44 2013 (r334361) +++ head/security/vuxml/vuln.xml Tue Nov 19 23:11:40 2013 (r334362) @@ -51,6 +51,87 @@ Note: Please add new entries to the beg --> + + samba -- Private key in key.pem world readable + + + samba4 + 4.0.*4.0.11 + + + samba41 + 4.1.*4.1.1 + + + + +

The Samba project reports:

+
+

Samba 4.0.x before 4.0.11 and 4.1.x before 4.1.1, when LDAP or HTTP is + provided over SSL, uses world-readable permissions for a private key, + which allows local users to obtain sensitive information by reading the + key file, as demonstrated by access to the local filesystem on an AD + domain controller.

+
+ +
+ + CVE-2013-4476 + http://www.samba.org/samba/security/CVE-2013-4476 + + + 2013-06-12 + 2013-11-19 + +
+ + + samba -- ACLs are not checked on opening an alternate data stream on a file or directory + + + samba34 + 0 + + + samba35 + 0 + + + samba36 + 3.6.*3.6.20 + + + samba4 + 4.0.*4.0.11 + + + samba41 + 4.1.*4.1.1 + + + + +

The Samba project reports:

+
+

Samba versions 3.2.0 and above (all versions of 3.2.x, 3.3.x, + 3.4.x, 3.5.x, 3.6.x, 4.0.x and 4.1.x) do not check the underlying + file or directory ACL when opening an alternate data stream.

+

According to the SMB1 and SMB2+ protocols the ACL on an underlying + file or directory should control what access is allowed to alternate + data streams that are associated with the file or directory.

+
+ +
+ + CVE-2013-4475 + http://www.samba.org/samba/security/CVE-2013-4475 + + + 2013-06-12 + 2013-11-19 + +
+ nginx -- Request line parsing vulnerability