From owner-svn-ports-head@FreeBSD.ORG Sun May 24 07:29:10 2015 Return-Path: Delivered-To: svn-ports-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 3E8DF8AD; Sun, 24 May 2015 07:29:10 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 202F51C22; Sun, 24 May 2015 07:29:10 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t4O7T93K012124; Sun, 24 May 2015 07:29:10 GMT (envelope-from delphij@FreeBSD.org) Received: (from delphij@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t4O7T9vJ012123; Sun, 24 May 2015 07:29:09 GMT (envelope-from delphij@FreeBSD.org) Message-Id: <201505240729.t4O7T9vJ012123@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: delphij set sender to delphij@FreeBSD.org using -f From: Xin LI Date: Sun, 24 May 2015 07:29:09 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r387252 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 24 May 2015 07:29:10 -0000 Author: delphij Date: Sun May 24 07:29:09 2015 New Revision: 387252 URL: https://svnweb.freebsd.org/changeset/ports/387252 Log: Document cassandra remote code execution vulnerability. PR: 199091 Submitted by: Jason Unovitch Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sun May 24 07:24:22 2015 (r387251) +++ head/security/vuxml/vuln.xml Sun May 24 07:29:09 2015 (r387252) @@ -57,6 +57,53 @@ Notes: --> + + cassandra -- remote execution of arbitrary code + + + cassandra + 1.2.01.2.19 + + + cassandra2 + 2.0.02.0.14 + 2.1.02.1.4 + + + + +

Jake Luciani reports:

+
+

Under its default configuration, Cassandra binds an unauthenticated + JMX/RMI interface to all network interfaces. As RMI is an API for the + transport and remote execution of serialized Java, anyone with access + to this interface can execute arbitrary code as the running user.

+

Mitigation:

+

1.2.x has reached EOL, so users of <= 1.2.x are recommended to upgrade + to a supported version of Cassandra, or manually configure encryption + and authentication of JMX, + (see https://wiki.apache.org/cassandra/JmxSecurity).

+

2.0.x users should upgrade to 2.0.14

+

2.1.x users should upgrade to 2.1.4

+

Alternately, users of any version not wishing to upgrade can + reconfigure JMX/RMI to enable encryption and authentication according + to https://wiki.apache.org/cassandra/JmxSecurityor + http://docs.oracle.com/javase/7/docs/technotes/guides/management/agent.html

+

Credit:

+

This issue was discovered by Georgi Geshev of MWR InfoSecurity

+
+ +
+ + http://mail-archives.apache.org/mod_mbox/cassandra-dev/201504.mbox/raw/%3CCALamADJu4yo=cO8HgA6NpgFc1wQN_VNqpkMn-3SZwhPq9foLBw@mail.gmail.com%3E/ + CVE-2015-0225 + + + 2015-04-01 + 2015-05-24 + +
+ py-salt -- potential shell injection vulnerabilities