From owner-svn-ports-all@FreeBSD.ORG Fri May 31 11:33:42 2013 Return-Path: Delivered-To: svn-ports-all@freebsd.org Received: from mx1.freebsd.org (mx1.FreeBSD.org [8.8.178.115]) by hub.freebsd.org (Postfix) with ESMTP id C351380E; Fri, 31 May 2013 11:33:42 +0000 (UTC) (envelope-from crees@FreeBSD.org) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) by mx1.freebsd.org (Postfix) with ESMTP id B452091B; Fri, 31 May 2013 11:33:42 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.6/8.14.6) with ESMTP id r4VBXg18061290; Fri, 31 May 2013 11:33:42 GMT (envelope-from crees@svn.freebsd.org) Received: (from crees@localhost) by svn.freebsd.org (8.14.6/8.14.5/Submit) id r4VBXfoR061287; Fri, 31 May 2013 11:33:41 GMT (envelope-from crees@svn.freebsd.org) Message-Id: <201305311133.r4VBXfoR061287@svn.freebsd.org> From: Chris Rees Date: Fri, 31 May 2013 11:33:41 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r319486 - in head: . irc irc/bitchx-devel security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 31 May 2013 11:33:42 -0000 Author: crees Date: Fri May 31 11:33:41 2013 New Revision: 319486 URL: http://svnweb.freebsd.org/changeset/ports/319486 Log: Actually remove bitchx-devel and add a VuXML entry. Security: CVE-2007-4584 Security: CVE-2007-5839 Security: CVE-2007-5922 Deleted: head/irc/bitchx-devel/ Modified: head/MOVED head/irc/Makefile head/security/vuxml/vuln.xml Modified: head/MOVED ============================================================================== --- head/MOVED Fri May 31 11:12:58 2013 (r319485) +++ head/MOVED Fri May 31 11:33:41 2013 (r319486) @@ -4333,3 +4333,4 @@ x11-toolkits/linux-gtk2||2013-05-30|Has x11-toolkits/linux-openmotif||2013-05-30|Has expired: Only used on FreeBSD 7, which is end-of-life x11-toolkits/linux-pango||2013-05-30|Has expired: Only used on FreeBSD 7, which is end-of-life x11-toolkits/linux-qt33||2013-05-30|Has expired: Only used on FreeBSD 7, which is end-of-life +irc/bitchx-devel|irc/bitchx|2013-05-31|Release finally cut Modified: head/irc/Makefile ============================================================================== --- head/irc/Makefile Fri May 31 11:12:58 2013 (r319485) +++ head/irc/Makefile Fri May 31 11:33:41 2013 (r319486) @@ -6,7 +6,6 @@ SUBDIR += anope SUBDIR += bip SUBDIR += bitchx - SUBDIR += bitchx-devel SUBDIR += bitlbee SUBDIR += bnc SUBDIR += bobot++ Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri May 31 11:12:58 2013 (r319485) +++ head/security/vuxml/vuln.xml Fri May 31 11:33:41 2013 (r319486) @@ -51,6 +51,56 @@ Note: Please add new entries to the beg --> + + irc/bitchx -- multiple vulnerabilities + + + BitchX + 1.2.*,1 + + + + +

bannedit reports:

+
+

Stack-based buffer overflow in BitchX 1.1 Final allows remote IRC + servers to execute arbitrary code via a long string in a MODE + command, related to the p_mode variable.

+
+

Nico Golde reports:

+
+

There is a security issue in ircii-pana in bitchx' hostname + command. The e_hostname function (commands.c) uses tmpnam to + create a temporary file which is known to be insecure.

+
+

Chris reports:

+
+

Chris has reported a vulnerability in the Cypress script for + BitchX, which can be exploited by malicious people to disclose + potentially sensitive information or to compromise a vulnerable + system.

+ +

The vulnerability is caused due to malicious code being present + in the modules/mdop.m file. This can be exploited to disclose the + content of various system files or to execute arbitrary shell + commands.

+ +

Successful exploitation allows execution of arbitrary code, but + requires the control of the "lsyn.webhop.net" domain.

+
+ +
+ + CVE-2007-4584 + CVE-2007-5839 + CVE-2007-5922 + + + 2007-08-28 + 2013-05-31 + +
+ znc -- null pointer dereference in webadmin module