Date: Sat, 18 Aug 2012 14:30:24 -0700 From: Jason Helfman <jgh@FreeBSD.org> To: Doug Barton <dougb@FreeBSD.org> Cc: svn-ports-head@freebsd.org, svn-ports-all@freebsd.org, ports-committers@freebsd.org Subject: Re: svn commit: r302713 - in head/security: libotr vuxml Message-ID: <20120818213024.GA43512@dormouse.experts-exchange.com> In-Reply-To: <201208180839.q7I8ddm2096742@svn.freebsd.org> References: <201208180839.q7I8ddm2096742@svn.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
>Modified: head/security/vuxml/vuln.xml >============================================================================== >--- head/security/vuxml/vuln.xml Sat Aug 18 08:32:03 2012 (r302712) >+++ head/security/vuxml/vuln.xml Sat Aug 18 08:39:39 2012 (r302713) >@@ -37,21 +37,58 @@ QUICK GUIDE TO ADDING A NEW ENTRY > 2. fill in the template > 3. use 'make validate' to verify syntax correctness (you might need to install > textproc/libxml2 for parser, and this port for catalogs) >-4. run 'make tidy' and then diff vuln.xml and vuln.xml.tidy - there should be >- no difference. >-5. ??? >-6. profit! >+4. fix any errors >+5. profit! > >-Extensive documentation of the format is available in Porter's Handbook at >+Extensive documentation of the format and help with writing and verifying >+a new entry is available in The Porter's Handbook at: > > http://www.freebsd.org/doc/en/books/porters-handbook/security-notify.html > >-Help is available from ports-security@freebsd.org >+Help is also available from ports-security@freebsd.org. > > Note: Please add new entries to the beginning of this file. > > --> > <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> >+ <vuln vid="c651c898-e90d-11e1-b230-0024e830109b"> >+ <topic>libotr -- buffer overflows</topic> >+ <affects> >+ <package> >+ <name>libotr</name> >+ <range><lt>3.2.1</lt></range> >+ </package> >+ </affects> >+ <description> >+ <body xmlns="http://www.w3.org/1999/xhtml"> >+ <p>OTR developers report:</p> >+ <blockquote cite="http://lists.cypherpunks.ca/pipermail/otr-dev/2012-July/001347.html"> >+ <p>The otrl_base64_otr_decode() function and similar functions within OTR >+ suffer from buffer overflows in the case of malformed input; >+ specifically if a message of the format of "?OTR:===." is received >+ then a zero-byte allocation is performed without a similar correlation >+ between the subsequent base64 decoding write, as such it becomes >+ possible to write between zero and three bytes incorrectly to the >+ heap, albeit only with a value of '='.</p> >+ <p>Because this code path is highly utilized, specifically in the >+ reception of instant messages over pidgin or similar, this >+ vulnerability is considered severe even though in many platforms and >+ circumstances the bug would yield an unexploitable state and result >+ simply in denial of service.</p> >+ <p>The developers of OTR promptly fixed the errors and users of OTR are >+ advised to upgrade the software at the next release cycle.</p> >+ </blockquote> >+ </body> >+ </description> >+ <references> >+ <cvename>CVE-2012-3461</cvename> >+ </references> >+ <dates> >+ <discovery>2012-07-27</discovery> >+ <entry>2012-08-18</entry> >+ </dates> >+ </vuln> >+ > <vuln vid="0f62be39-e8e0-11e1-bea0-002354ed89bc"> > <topic>OpenTTD -- Denial of Service</topic> > <affects> > Thanks for the update, Doug! I did have one question though, and I know this comes up now and then. Can you please add the cited url to the reference block inside a url tag? And thank you again for the update, along with the vuxml! Always very nice when it can happen at once. -jgh -- Jason Helfman FreeBSD Committer | http://people.freebsd.org/~jgh | The Power To Serve
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20120818213024.GA43512>