Date: Mon, 12 Nov 2012 23:04:35 +0000 (UTC) From: Rene Ladan <rene@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-branches@freebsd.org Subject: svn commit: r307352 - branches/RELENG_9_1_0/security/vuxml Message-ID: <201211122304.qACN4ZsK027041@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: rene Date: Mon Nov 12 23:04:34 2012 New Revision: 307352 URL: http://svnweb.freebsd.org/changeset/ports/307352 Log: MFH r307348: document typo3 vulnerabilities [1] This also merges the changes to vuln.xml of r307247, r307259, r307261, r307263, r307282, r307286, r307334, and r307335 Approved by: portmgr (beat) Obtained from: http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-005/ [1] Feature safe: yes Modified: branches/RELENG_9_1_0/security/vuxml/vuln.xml Directory Properties: branches/RELENG_9_1_0/ (props changed) Modified: branches/RELENG_9_1_0/security/vuxml/vuln.xml ============================================================================== --- branches/RELENG_9_1_0/security/vuxml/vuln.xml Mon Nov 12 22:41:21 2012 (r307351) +++ branches/RELENG_9_1_0/security/vuxml/vuln.xml Mon Nov 12 23:04:34 2012 (r307352) @@ -51,6 +51,217 @@ Note: Please add new entries to the beg --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="79818ef9-2d10-11e2-9160-00262d5ed8ee"> + <topic>typo3 -- Multiple vulnerabilities in TYPO3 Core</topic> + <affects> + <package> + <name>typo3</name> + <range><ge>4.5.0</ge><lt>4.5.21</lt></range> + <range><ge>4.6.0</ge><lt>4.6.14</lt></range> + <range><ge>4.7.0</ge><lt>4.7.6</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Typo Security Team reports:</p> + <blockquote cite="http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-005/"> + <p>TYPO3 Backend History Module - Due to missing encoding of user + input, the history module is susceptible to SQL Injection and + Cross-Site Scripting. A valid backend login is required to exploit + this vulnerability. Credits go to Thomas Worm who discovered and + reported the issue.</p> + <p>TYPO3 Backend API - Failing to properly HTML-encode user input the + tree render API (TCA-Tree) is susceptible to Cross-Site Scripting. + TYPO3 Versions below 6.0 does not make us of this API, thus is not + exploitable, if no third party extension is installed which uses + this API. A valid backend login is required to exploit this + vulnerability. Credits go to Richard Brain who discovered and + reported the issue.</p> + </blockquote> + </body> + </description> + <references> + <url>http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-005/</url> + </references> + <dates> + <discovery>2012-11-08</discovery> + <entry>2012-11-12</entry> + </dates> + </vuln> + + <vuln vid="a537b449-2b19-11e2-b339-90e6ba652cce"> + <topic>DomainKeys Identified Mail (DKIM) Verifiers may inappropriately convey message trust</topic> + <affects> + <package> + <name>opendkim</name> + <range><lt>2.7.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>US-CERT reports:</p> + <blockquote cite="http://www.kb.cert.org/vuls/id/268267"> + <p>DomainKeys Identified Mail (DKIM) Verifiers may + inappropriately convey message trust when messages are + signed using test or small bit signing keys.</p> + </blockquote> + </body> + </description> + <references> + <certvu>268267</certvu> + </references> + <dates> + <discovery>2012-10-24</discovery> + <entry>2012-11-12</entry> + </dates> + </vuln> + + <vuln vid="e02c572f-2af0-11e2-bb44-003067b2972c"> + <topic>weechat -- Crash or freeze when decoding IRC colors in strings</topic> + <affects> + <package> + <name>weechat</name> + <range><ge>0.3.6</ge><lt>0.3.9.1</lt></range> + </package> + <package> + <name>weechat-devel</name> + <range><ge>20110614</ge><lt>20121110</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Sebastien Helleu reports:</p> + <blockquote cite="https://savannah.nongnu.org/bugs/?37704"> + <p>A buffer overflow is causing a crash or freeze of WeeChat when + decoding IRC colors in strings.</p> + </blockquote> + </body> + </description> + <references> + <freebsdpr>ports/173513</freebsdpr> + <url>http://weechat.org/security/</url> + <url>https://savannah.nongnu.org/bugs/?37704</url> + </references> + <dates> + <discovery>2012-11-09</discovery> + <entry>2012-11-10</entry> + <modified>2012-11-10</modified> + </dates> + </vuln> + + <vuln vid="5e647ca3-2aea-11e2-b745-001fd0af1a4c"> + <topic>ruby -- Hash-flooding DoS vulnerability for ruby 1.9</topic> + <affects> + <package> + <name>ruby</name> + <range><ge>1.9</ge><lt>1.9.3.327</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The official ruby site reports:</p> + <blockquote cite="http://www.ruby-lang.org/en/news/2012/11/09/ruby19-hashdos-cve-2012-5371/"> + <p>Carefully crafted sequence of strings can cause a denial of service + attack on the service that parses the sequence to create a Hash + object by using the strings as keys. For instance, this + vulnerability affects web application that parses the JSON data + sent from untrusted entity.</p> + <p>This vulnerability is similar to CVS-2011-4815 for ruby 1.8.7. ruby + 1.9 versions were using modified MurmurHash function but it's + reported that there is a way to create sequence of strings that + collide their hash values each other. This fix changes the Hash + function of String object from the MurmurHash to SipHash 2-4.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2012-5371</cvename> + <url>http://www.ruby-lang.org/en/news/2012/11/09/ruby19-hashdos-cve-2012-5371/</url> + </references> + <dates> + <discovery>2012-11-10</discovery> + <entry>2012-11-10</entry> + </dates> + </vuln> + + <vuln vid="152e4c7e-2a2e-11e2-99c7-00a0d181e71d"> + <topic>tomcat -- authentication weaknesses</topic> + <affects> + <package> + <name>tomcat</name> + <range><gt>5.5.0</gt><lt>5.5.36</lt></range> + <range><gt>6.0.0</gt><lt>6.0.36</lt></range> + <range><gt>7.0.0</gt><lt>7.0.30</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Apache Software Foundation reports:</p> + <blockquote cite="http://tomcat.apache.org/security.html"> + <p>Three weaknesses in Tomcat's implementation of DIGEST + authentication were identified and resolved:</p> + <ul> + <li> Tomcat tracked client rather than server nonces and nonce count.</li> + <li> When a session ID was present, authentication was bypassed.</li> + <li> The user name and password were not checked before when indicating + that a nonce was stale.</li> + </ul> + <p>These issues reduced the security of DIGEST authentication making + replay attacks possible in some circumstances.</p> + <p>The first issue was identified by Tilmann Kuhn. The second and third + issues were identified by the Tomcat security team during the code + review resulting from the first issue.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2012-3439</cvename> + <url>http://tomcat.apache.org/security.html</url> + <url>http://tomcat.apache.org/security-5.html</url> + <url>http://tomcat.apache.org/security-6.html</url> + <url>http://tomcat.apache.org/security-7.html</url> + </references> + <dates> + <discovery>2012-11-05</discovery> + <entry>2012-11-08</entry> + <modified>2012-11-09</modified> + </dates> + </vuln> + + <vuln vid="4ca26574-2a2c-11e2-99c7-00a0d181e71d"> + <topic>tomcat -- Denial of Service</topic> + <affects> + <package> + <name>tomcat</name> + <range><gt>6.0.0</gt><lt>6.0.36</lt></range> + <range><gt>7.0.0</gt><lt>7.0.28</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Apache Software Foundation reports:</p> + <blockquote cite="http://tomcat.apache.org/security.html"> + <p>The checks that limited the permitted size of request headers were + implemented too late in the request parsing process for the HTTP NIO + connector. This enabled a malicious user to trigger an + OutOfMemoryError by sending a single request with very large + headers. This issue was identified by Josh Spiewak.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2012-2733</cvename> + <url>http://tomcat.apache.org/security.html</url> + <url>http://tomcat.apache.org/security-6.html</url> + <url>http://tomcat.apache.org/security-7.html</url> + </references> + <dates> + <discovery>2012-11-05</discovery> + <entry>2012-11-08</entry> + <modified>2012-11-09</modified> + </dates> + </vuln> + <vuln vid="4b8b748e-2a24-11e2-bb44-003067b2972c"> <topic>linux-flashplugin -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201211122304.qACN4ZsK027041>