Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 15 Jun 2017 20:42:51 +0000 (UTC)
From:      Matthew Seaman <matthew@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r443637 - head/security/vuxml
Message-ID:  <201706152042.v5FKgpAT062198@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: matthew
Date: Thu Jun 15 20:42:51 2017
New Revision: 443637
URL: https://svnweb.freebsd.org/changeset/ports/443637

Log:
  Document multiple vulnerabilities in www/rt42, www/rt44 and www/p5-RT-Authen-ExternalAuth

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu Jun 15 20:25:02 2017	(r443636)
+++ head/security/vuxml/vuln.xml	Thu Jun 15 20:42:51 2017	(r443637)
@@ -58,6 +58,105 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="7a92e958-5207-11e7-8d7c-6805ca0b3d42">
+    <topic>rt and dependent modules -- multiple security vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>rt42</name>
+	<range><ge>4.2.0</ge><lt>4.2.13_1</lt></range>
+      </package>
+      <package>
+	<name>rt44</name>
+	<range><ge>4.4.0</ge><lt>4.4.1_1</lt></range>
+      </package>
+      <package>
+	<name>p5-RT-Authen-ExternalAuth</name>
+	<range><ge>0.9</ge><lt>0.26_1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>BestPractical reports:</p>
+	<blockquote cite="http://lists.bestpractical.com/pipermail/rt-announce/2017-June/000297.html">;
+	  <p>RT 4.0.0 and above are vulnerable to an information
+	    leak of cross-site request forgery (CSRF) verification
+	    tokens if a user visits a specific URL crafted by an
+	    attacker. This vulnerability is assigned CVE-2017-5943. It
+	    was discovered by a third-party security researcher.</p>
+
+	  <p>RT 4.0.0 and above are vulnerable to a cross-site
+	    scripting (XSS) attack if an attacker uploads a malicious
+	    file with a certain content type.  Installations which use
+	    the AlwaysDownloadAttachments config setting are
+	    unaffected. This fix addresses all existant and future
+	    uploaded attachments. This vulnerability is assigned
+	    CVE-2016-6127. This was responsibly disclosed to us first
+	    by Scott Russo and the GE Application Security Assessment
+	    Team.</p>
+
+	  <p>One of RT's dependencies, a Perl module named
+	    Email::Address, has a denial of service vulnerability
+	    which could induce a denial of service of RT itself. We
+	    recommend administrators install Email::Address version
+	    1.908 or above, though we additionally provide a new
+	    workaround within RT. Tss vulnerability was assigned
+	    CVE-2015-7686. This vulnerability's application to RT was
+	    brought to our attention by Pali Rohár.</p>
+
+	  <p>RT 4.0.0 and above are vulnerable to timing
+	    side-channel attacks for user passwords. By carefully
+	    measuring millions or billions of login attempts, an
+	    attacker could crack a user's password even over the
+	    internet. RT now uses a constant-time comparison algorithm
+	    for secrets to thwart such attacks. This vulnerability is
+	    assigned CVE-2017-5361.  This was responsibly disclosed to
+	    us by Aaron Kondziela.</p>
+
+	  <p>RT's ExternalAuth feature is vulnerable to a similar
+	    timing side-channel attack. Both RT 4.0/4.2 with the
+	    widely-deployed RT::Authen::ExternalAuth extension, as
+	    well as the core ExternalAuth feature in RT 4.4 are
+	    vulnerable. Installations which don't use ExternalAuth, or
+	    which use ExternalAuth for LDAP/ActiveDirectory
+	    authentication, or which use ExternalAuth for cookie-based
+	    authentication, are unaffected. Only ExternalAuth in DBI
+	    (database) mode is vulnerable.</p>
+
+	  <p>RT 4.0.0 and above are potentially vulnerable to a
+	    remote code execution attack in the dashboard subscription
+	    interface. A privileged attacker can cause unexpected code
+	    to be executed through carefully-crafted saved search
+	    names. Though we have not been able to demonstrate an
+	    actual attack owing to other defenses in place, it could
+	    be possible. This fix addresses all existant and future
+	    saved searches. This vulnerability is assigned
+	    CVE-2017-5944. It was discovered by an internal security
+	    audit.</p>
+
+	  <p>RT 4.0.0 and above have misleading documentation which
+	    could reduce system security. The RestrictLoginReferrer
+	    config setting (which has security implications) was
+	    inconsistent with its implementation, which checked for a
+	    slightly different variable name. RT will now check for
+	    the incorrect name and produce an error message. This was
+	    responsibly disclosed to us by Alex Vandiver.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>http://lists.bestpractical.com/pipermail/rt-announce/2017-June/000297.html</url>;
+      <cvename>CVE-2015-7686</cvename>
+      <cvename>CVE-2016-6127</cvename>
+      <cvename>CVE-2017-5361</cvename>
+      <cvename>CVE-2017-5943</cvename>
+      <cvename>CVE-2017-5944</cvename>
+    </references>
+    <dates>
+      <discovery>2017-06-15</discovery>
+      <entry>2017-06-15</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="cd944b3f-51f6-11e7-b7b2-001c25e46b1d">
     <topic>Flash Player -- multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201706152042.v5FKgpAT062198>