Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 20 Sep 2021 00:52:39 +0700
From:      Eugene Grosbein <eugen@freebsd.org>
To:        "Herbert J. Skuhra" <herbert@gojira.at>
Cc:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   Re: git: 2c7d4d50c06a - main - security/vuxml: add net/mpd5 PPPoE Server remotely exploitable crash
Message-ID:  <b05541dd-2f66-6c0d-4878-907b7d66b92e@freebsd.org>
In-Reply-To: <87v92xjbai.wl-herbert@gojira.at>
References:  <202109082208.188M8tVX016686@gitrepo.freebsd.org> <87v92xjbai.wl-herbert@gojira.at>

next in thread | previous in thread | raw e-mail | index | archive | help
19.09.2021 14:04, Herbert J. Skuhra wrote:

> On Thu, 09 Sep 2021 00:08:55 +0200, Eugene Grosbein wrote:
>>
>> The branch main has been updated by eugen:
>>
>> URL: https://cgit.FreeBSD.org/ports/commit/?id=2c7d4d50c06ac12410414813427604ee9af673dd
>>
>> commit 2c7d4d50c06ac12410414813427604ee9af673dd
>> Author:     Eugene Grosbein <eugen@FreeBSD.org>
>> AuthorDate: 2021-09-08 21:55:19 +0000
>> Commit:     Eugene Grosbein <eugen@FreeBSD.org>
>> CommitDate: 2021-09-08 22:02:51 +0000
>>
>>     security/vuxml: add net/mpd5 PPPoE Server remotely exploitable crash
>>     
>>     Version 5.9_2 contains security fix for PPPoE servers.
>>     Insufficient validation of incoming PPPoE Discovery request
>>     specially crafted by unauthenticated user might lead to unexpected
>>     termination of the process. The problem affects mpd versions since 5.0.
>>     Installations not using PPPoE server configuration were not affected.
>>     
>>     Reported by:    Yannick C at SourceForge
>>     Tested by:      Yannick C at SourceForge, paul at SourceForge
>> ---
>>  security/vuxml/vuln-2021.xml | 28 ++++++++++++++++++++++++++++
>>  1 file changed, 28 insertions(+)
>>
>> diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml
>> index 09525e60d803..1b308b51ea74 100644
>> --- a/security/vuxml/vuln-2021.xml
>> +++ b/security/vuxml/vuln-2021.xml
>> @@ -1,3 +1,31 @@
>> +  <vuln vid="f55921aa-10c9-11ec-8647-00e0670f2660">
>> +    <topic>MPD5 PPPoE Server remotely exploitable crash</topic>
>> +    <affects>
>> +      <package>
>> +	<name>mpd5</name>
>> +	<range><ge>5.0</ge></range>
>> +	<range><lt>5.9_2</lt></range>
>> +      </package>
>> +    </affects>
>> +    <description>
>> +      <body xmlns="http://www.w3.org/1999/xhtml">;
>> +	<p>Version 5.9_2 contains security fix for PPPoE servers.
>> +	Insufficient validation of incoming PPPoE Discovery request
>> +	specially crafted by unauthenticated user might lead to unexpected
>> +	termination of the process. The problem affects mpd versions
>> +	since 5.0. Installations not using PPPoE server configuration
>> +	were not affected.</p>
>> +      </body>
>> +    </description>
>> +    <references>
>> +	<url>http://mpd.sourceforge.net/doc5/mpd4.html#4</url>;
>> +    </references>
>> +    <dates>
>> +      <discovery>2021-09-04</discovery>
>> +      <entry>2021-09-09</entry>
>> +    </dates>
>> +  </vuln>
>> +
> 
> ===>  mpd5-5.9_4 has known vulnerabilities:
> mpd5-5.9_4 is vulnerable:
>   MPD5 PPPoE Server remotely exploitable crash
>   WWW: https://vuxml.FreeBSD.org/freebsd/f55921aa-10c9-11ec-8647-00e0670f2660.html

That VuXML entry problem was fixed 17 September but pkg audit fetches
http://vuxml.freebsd.org/freebsd/vuln.xml.xz and this file staled since 16 September for unknown reason.




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?b05541dd-2f66-6c0d-4878-907b7d66b92e>