svn commit: r418575 - head/security/vuxml
Raphael Kubo da Costa
rakuco at FreeBSD.org
Fri Jul 15 11:23:24 UTC 2016
Author: rakuco
Date: Fri Jul 15 11:23:23 2016
New Revision: 418575
URL: https://svnweb.freebsd.org/changeset/ports/418575
Log:
Document CVE-2016-2334 and CVE-2016-2335 in archivers/p7zip.
PR: 211114
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Fri Jul 15 09:00:37 2016 (r418574)
+++ head/security/vuxml/vuln.xml Fri Jul 15 11:23:23 2016 (r418575)
@@ -58,6 +58,70 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="d706a3a3-4a7c-11e6-97f7-5453ed2e2b49">
+ <topic>p7zip -- out-of-bounds read vulnerability</topic>
+ <affects>
+ <package>
+ <name>p7zip</name>
+ <range><lt>15.14_1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Cisco Talos reports:</p>
+ <blockquote cite="http://www.talosintelligence.com/reports/TALOS-2016-0094/">
+ <p>An out-of-bounds read vulnerability exists in the way 7-Zip
+ handles Universal Disk Format (UDF) files.</p>
+ <p>Central to 7-Zip’s processing of UDF files is the
+ CInArchive::ReadFileItem method. Because volumes can have more than
+ one partition map, their objects are kept in an object vector. To
+ start looking for an item, this method tries to reference the proper
+ object using the partition map’s object vector and the "PartitionRef"
+ field from the Long Allocation Descriptor. Lack of checking whether
+ the "PartitionRef" field is bigger than the available amount of
+ partition map objects causes a read out-of-bounds and can lead, in
+ some circumstances, to arbitrary code execution.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2016-2335</cvename>
+ <url>http://blog.talosintel.com/2016/05/multiple-7-zip-vulnerabilities.html</url>
+ </references>
+ <dates>
+ <discovery>2016-05-11</discovery>
+ <entry>2016-07-15</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="a9bcaf57-4a7b-11e6-97f7-5453ed2e2b49">
+ <topic>p7zip -- heap overflow vulnerability</topic>
+ <affects>
+ <package>
+ <name>p7zip</name>
+ <range><lt>15.14_1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Cisco Talos reports:</p>
+ <blockquote cite="http://www.talosintelligence.com/reports/TALOS-2016-0093/">
+ <p>An exploitable heap overflow vulnerability exists in the
+ NArchive::NHfs::CHandler::ExtractZlibFile method functionality of
+ 7zip that can lead to arbitrary code execution.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2016-2334</cvename>
+ <url>http://blog.talosintel.com/2016/05/multiple-7-zip-vulnerabilities.html</url>
+ </references>
+ <dates>
+ <discovery>2016-05-11</discovery>
+ <entry>2016-07-15</entry>
+ </dates>
+ </vuln>
+
<vuln vid="4729c849-4897-11e6-b704-000c292e4fd8">
<topic>samba -- client side SMB2/3 required signing can be downgraded</topic>
<affects>
More information about the svn-ports-head
mailing list