Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 11 Jul 2013 21:28:39 +0000 (UTC)
From:      Xin LI <delphij@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r322798 - head/security/vuxml
Message-ID:  <201307112128.r6BLSdb1027211@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: delphij
Date: Thu Jul 11 21:28:39 2013
New Revision: 322798
URL: http://svnweb.freebsd.org/changeset/ports/322798

Log:
  Wrap long lines.  No content change.

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu Jul 11 20:35:19 2013	(r322797)
+++ head/security/vuxml/vuln.xml	Thu Jul 11 21:28:39 2013	(r322798)
@@ -63,9 +63,21 @@ Note:  Please add new entries to the beg
       <body xmlns="http://www.w3.org/1999/xhtml">;
 	<p>Mark Dowd reports:</p>
 	<blockquote cite="http://blog.azimuthsecurity.com/2013/06/attacking-crypto-phones-weaknesses-in.html">;
-	  <p>Vulnerability 1. Remote Heap Overflow: If an attacker sends a packet larger than 1024 bytes that gets stored temporarily (which occurs many times - such as when sending a ZRTP Hello packet), a heap overflow will occur, leading to potential arbitrary code execution on the vulnerable host.</p>
-	  <p>Vulnerability 2. Multiple Stack Overflows: ZRTPCPP contains multiple stack overflows that arise when preparing a response to a client's ZRTP Hello packet.</p>
-	  <p>Vulnerability 3. Information Leaking / Out of Bounds Reads: The ZRTPCPP library performs very little validation regarding the expected size of a packet versus the actual amount of data received. This can lead to both information leaking and out of bounds data reads (usually resulting in a crash). Information leaking can be performed for example by sending a malformed ZRTP Ping packet.</p>
+	  <p>Vulnerability 1. Remote Heap Overflow: If an attacker sends a
+	    packet larger than 1024 bytes that gets stored temporarily (which
+	    occurs many times - such as when sending a ZRTP Hello packet), a
+	    heap overflow will occur, leading to potential arbitrary code
+	    execution on the vulnerable host.</p>
+	  <p>Vulnerability 2. Multiple Stack Overflows: ZRTPCPP contains
+	    multiple stack overflows that arise when preparing a response
+	    to a client's ZRTP Hello packet.</p>
+	  <p>Vulnerability 3. Information Leaking / Out of Bounds Reads:
+	    The ZRTPCPP library performs very little validation regarding the
+	    expected size of a packet versus the actual amount of data
+	    received. This can lead to both information leaking and out
+	    of bounds data reads (usually resulting in a crash).
+	    Information leaking can be performed for example by sending
+	    a malformed ZRTP Ping packet.</p>
 	</blockquote>
       </body>
     </description>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201307112128.r6BLSdb1027211>