From owner-svn-ports-all@FreeBSD.ORG Sun Mar 8 11:55:52 2015 Return-Path: Delivered-To: svn-ports-all@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 459B1297; Sun, 8 Mar 2015 11:55:52 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 18148620; Sun, 8 Mar 2015 11:55:52 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t28BtpwX089882; Sun, 8 Mar 2015 11:55:51 GMT (envelope-from matthew@FreeBSD.org) Received: (from matthew@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t28BtpGH089881; Sun, 8 Mar 2015 11:55:51 GMT (envelope-from matthew@FreeBSD.org) Message-Id: <201503081155.t28BtpGH089881@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: matthew set sender to matthew@FreeBSD.org using -f From: Matthew Seaman Date: Sun, 8 Mar 2015 11:55:51 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r380770 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 08 Mar 2015 11:55:52 -0000 Author: matthew Date: Sun Mar 8 11:55:51 2015 New Revision: 380770 URL: https://svnweb.freebsd.org/changeset/ports/380770 QAT: https://qat.redports.org/buildarchive/r380770/ Log: Document latest security vulnerabilities in rt42 and rt40: CVE-2014-9472 CVE-2015-1165 CVE-2015-1464 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sun Mar 8 11:48:25 2015 (r380769) +++ head/security/vuxml/vuln.xml Sun Mar 8 11:55:51 2015 (r380770) @@ -57,6 +57,52 @@ Notes: --> + + rt -- Remote DoS, Information disclosure and Session Hijackingvulnerabilities + + + rt42 + 4.2.04.2.10 + + + rt40 + 4.0.04.0.23 + + + + +

Best Practical reports:

+
+

RT 3.0.0 and above, if running on Perl 5.14.0 or higher, + are vulnerable to a remote denial-of-service via the email + gateway; any installation which accepts mail from untrusted + sources is vulnerable, regardless of the permissions + configuration inside RT. This denial-of-service may + encompass both CPU and disk usage, depending on RT's logging + configuration. This vulnerability is assigned + CVE-2014-9472.

+

RT 3.8.8 and above are vulnerable to an information + disclosure attack which may reveal RSS feeds URLs, and thus + ticket data; this vulnerability is assigned + CVE-2015-1165. RSS feed URLs can also be leveraged to + perform session hijacking, allowing a user with the URL to + log in as the user that created the feed; this vulnerability + is assigned CVE-2015-1464.

+
+ +
+ + http://blog.bestpractical.com/2015/02/security-vulnerabilities-in-rt.html + CVE-2014-9472 + CVE-2015-1165 + CVE-2015-1464 + + + 2015-02-26 + 2015-03-08 + +
+ phpMyAdmin -- Risk of BREACH attack due to reflected parameter