svn commit: r351539 - head/security/vuxml
Olli Hauer
ohauer at FreeBSD.org
Fri Apr 18 14:20:16 UTC 2014
Author: ohauer
Date: Fri Apr 18 14:20:15 2014
New Revision: 351539
URL: http://svnweb.freebsd.org/changeset/ports/351539
QAT: https://qat.redports.org/buildarchive/r351539/
Log:
- document bugzilla issues
CVE-2014-1517 is fixed in bugzilla-4.4.3
therefore use two vuxml entries.
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Fri Apr 18 14:02:09 2014 (r351538)
+++ head/security/vuxml/vuln.xml Fri Apr 18 14:20:15 2014 (r351539)
@@ -51,6 +51,76 @@ Note: Please add new entries to the beg
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="608ed765-c700-11e3-848c-20cf30e32f6d">
+ <topic>bugzilla -- Cross-Site Request Forgery</topic>
+ <affects>
+ <package>
+ <name>bugzilla40</name>
+ <name>bugzilla42</name>
+ <name>bugzilla44</name>
+ <range><ge>2.0.0</ge><lt>4.4.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>A Bugzilla Security Advisory reports:</h1>
+ <blockquote cite="http://www.bugzilla.org/security/4.0.11/">
+ <p>The login form had no CSRF protection, meaning that
+ an attacker could force the victim to log in using the
+ attacker's credentials. If the victim then reports a new
+ security sensitive bug, the attacker would get immediate
+ access to this bug.</p>
+ <p>
+ Due to changes involved in the Bugzilla API, this fix is
+ not backported to the 4.0 and 4.2 branches, meaning that
+ Bugzilla 4.0.12 and older, and 4.2.8 and older, will
+ remain vulnerable to this issue.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2014-1517</cvename>
+ <url>https://bugzilla.mozilla.org/show_bug.cgi?id=713926</url>
+ </references>
+ <dates>
+ <discovery>2014-04-17</discovery>
+ <entry>2014-04-18</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="60bfa396-c702-11e3-848c-20cf30e32f6d">
+ <topic>bugzilla -- Social Engineering</topic>
+ <affects>
+ <package>
+ <name>bugzilla40</name>
+ <name>bugzilla42</name>
+ <name>bugzilla44</name>
+ <range><ge>2.0.0</ge><lt>4.0.12</lt></range>
+ <range><ge>4.1.1</ge><lt>4.2.8</lt></range>
+ <range><ge>4.4.0</ge><lt>4.4.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>A Bugzilla Security Advisory reports:</h1>
+ <blockquote cite="http://www.bugzilla.org/security/4.0.11/">
+ <p>Dangerous control characters can be inserted into
+ Bugzilla, notably into bug comments. If the text, which
+ may look safe, is copied into a terminal such as xterm or
+ gnome-terminal, then unexpected commands could be executed
+ on the local machine.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://bugzilla.mozilla.org/show_bug.cgi?id=968576</url>
+ </references>
+ <dates>
+ <discovery>2014-04-17</discovery>
+ <entry>2014-04-18</entry>
+ </dates>
+ </vuln>
+
<vuln vid="abad20bf-c1b4-11e3-a5ac-001b21614864">
<topic>OpenLDAP -- incorrect handling of NULL in certificate Common Name</topic>
<affects>
More information about the svn-ports-all
mailing list