svn commit: r398678 - head/security/vuxml
Jason Unovitch
junovitch at FreeBSD.org
Tue Oct 6 02:54:50 UTC 2015
Author: junovitch
Date: Tue Oct 6 02:54:49 2015
New Revision: 398678
URL: https://svnweb.freebsd.org/changeset/ports/398678
Log:
Document OpenSMTPD vulnerabilities (5.7.3)
Revise pkg name, add PORTEPOCH, add more detail to earlier entry (5.7.2)
Security: 42852f72-6bd3-11e5-9909-002590263bf5
Security: ee7bdf7f-11bb-4eea-b054-c692ab848c20
Security: CVE-2015-7687
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Tue Oct 6 02:24:46 2015 (r398677)
+++ head/security/vuxml/vuln.xml Tue Oct 6 02:54:49 2015 (r398678)
@@ -58,6 +58,37 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="42852f72-6bd3-11e5-9909-002590263bf5">
+ <topic>OpenSMTPD -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>opensmtpd</name>
+ <range><lt>5.7.3,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>OpenSMTPD developers report:</p>
+ <blockquote cite="https://www.opensmtpd.org/announces/release-5.7.3.txt">
+ <p>fix an mda buffer truncation bug which allows a user to create
+ forward files that pass session checks but fail delivery later down
+ the chain, within the user mda</p>
+ <p>fix remote buffer overflow in unprivileged pony process</p>
+ <p>reworked offline enqueue to better protect against hardlink
+ attacks</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://www.openwall.com/lists/oss-security/2015/10/04/2</url>
+ <url>https://www.opensmtpd.org/announces/release-5.7.3.txt</url>
+ </references>
+ <dates>
+ <discovery>2015-10-04</discovery>
+ <entry>2015-10-06</entry>
+ </dates>
+ </vuln>
+
<vuln vid="5d280761-6bcf-11e5-9909-002590263bf5">
<topic>mbedTLS/PolarSSL -- multiple vulnerabilities</topic>
<affects>
@@ -254,16 +285,33 @@ Notes:
<topic>OpenSMTPD -- multiple vulnerabilities</topic>
<affects>
<package>
- <name>smtpd</name>
- <range><lt>5.7.2</lt></range>
+ <name>opensmtpd</name>
+ <range><lt>5.7.2,1</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>OpenSMTPD developers report:</p>
<blockquote cite="https://www.opensmtpd.org/announces/release-5.7.2.txt">
- <p>This is a minor release with security and reliability fixes only.
- You are encouraged to update as soon as possible.</p>
+ <p>an oversight in the portable version of fgetln() that allows
+ attackers to read and write out-of-bounds memory</p>
+ <p>multiple denial-of-service vulnerabilities that allow local users
+ to kill or hang OpenSMTPD</p>
+ <p>a stack-based buffer overflow that allows local users to crash
+ OpenSMTPD, or execute arbitrary code as the non-chrooted _smtpd
+ user</p>
+ <p>a hardlink attack (or race-conditioned symlink attack) that allows
+ local users to unset the chflags() of arbitrary files</p>
+ <p>a hardlink attack that allows local users to read the first line of
+ arbitrary files (for example, root's hash from /etc/master.passwd)
+ </p>
+ <p>a denial-of-service vulnerability that allows remote attackers to
+ fill OpenSMTPD's queue or mailbox hard-disk partition</p>
+ <p>an out-of-bounds memory read that allows remote attackers to crash
+ OpenSMTPD, or leak information and defeat the ASLR protection</p>
+ <p>a use-after-free vulnerability that allows remote attackers to
+ crash OpenSMTPD, or execute arbitrary code as the non-chrooted
+ _smtpd user</p>
</blockquote>
</body>
</description>
@@ -274,6 +322,7 @@ Notes:
<dates>
<discovery>2015-10-02</discovery>
<entry>2015-10-04</entry>
+ <modified>2015-10-06</modified>
</dates>
</vuln>
More information about the svn-ports-all
mailing list