Date: Sat, 14 Oct 2017 10:46:24 +0000 (UTC) From: Guido Falsi <madpilot@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r452053 - head/security/vuxml Message-ID: <201710141046.v9EAkO0s049838@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: madpilot Date: Sat Oct 14 10:46:24 2017 New Revision: 452053 URL: https://svnweb.freebsd.org/changeset/ports/452053 Log: Document textproc/freexl security vulnerabilities. PR: 222130 Submitted by: lbartoletti@tuxfamily.org (maintainer) Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sat Oct 14 10:39:44 2017 (r452052) +++ head/security/vuxml/vuln.xml Sat Oct 14 10:46:24 2017 (r452053) @@ -58,6 +58,37 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="555cd806-b031-11e7-a369-14dae9d59f67"> + <topic>Multiple exploitable heap-based buffer overflow vulnerabilities exists in FreeXL 1.0.3</topic> + <affects> + <package> + <name>freexl</name> + <range><lt>1.0.4</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Cisco TALOS reports:</p> + <blockquote cite="http://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0430"> + <p>An exploitable heap based buffer overflow vulnerability exists in the read_biff_next_record function of FreeXL 1.0.3. A specially crafted XLS file can cause a memory corruption resulting in remote code execution. An attacker can send malicious XLS file to trigger this vulnerability.</p> + </blockquote> + <blockquote cite="https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0431"> + <p>An exploitable heap-based buffer overflow vulnerability exists in the read_legacy_biff function of FreeXL 1.0.3. A specially crafted XLS file can cause a memory corruption resulting in remote code execution. An attacker can send malicious XLS file to trigger this vulnerability.</p> + </blockquote> + </body> + </description> + <references> + <url>https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0430</url> + <cvename>CVE-2017-2923</cvename> + <url>https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0431</url> + <cvename>CVE-2017-2924</cvename> + </references> + <dates> + <discovery>2017-09-11</discovery> + <entry>2017-10-13</entry> + </dates> + </vuln> + <vuln vid="ed73829d-af6d-11e7-a633-009c02a2ab30"> <topic>FFmpeg -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201710141046.v9EAkO0s049838>