diff options
author | feld <feld@FreeBSD.org> | 2016-07-20 20:25:51 +0800 |
---|---|---|
committer | feld <feld@FreeBSD.org> | 2016-07-20 20:25:51 +0800 |
commit | 4415fc584d7da4e89f4a50811804c3d14269fda6 (patch) | |
tree | 3a38d955014e7399a2b4110ad96c2ce9f5a093dc | |
parent | 40d696908a53b62ed024fc709ff880b1c230eabc (diff) | |
download | freebsd-ports-gnome-4415fc584d7da4e89f4a50811804c3d14269fda6.tar.gz freebsd-ports-gnome-4415fc584d7da4e89f4a50811804c3d14269fda6.tar.zst freebsd-ports-gnome-4415fc584d7da4e89f4a50811804c3d14269fda6.zip |
Remove HTTPoxy entry in vuxml until a we know if upstream vendors will
patch this so things aren't marked vulnerable forever.
-rw-r--r-- | security/vuxml/vuln.xml | 103 |
1 files changed, 0 insertions, 103 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 0161706e8d4c..d1b12655046f 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -96,109 +96,6 @@ Notes: </dates> </vuln> - <vuln vid="cf0b5668-4d1b-11e6-b2ec-b499baebfeaf"> - <topic>Multiple ports -- Proxy HTTP header vulnerability (httpoxy)</topic> - <affects> - <package> - <name>apache22</name> - <name>apache22-event-mpm</name> - <name>apache22-itk-mpm</name> - <name>apache22-peruser-mpm</name> - <name>apache22-worker-mpm</name> - <range><lt>2.2.31_1</lt></range> - </package> - <package> - <name>apache24</name> - <range><lt>2.4.23_1</lt></range> - </package> - <package> - <name>tomcat6</name> - <range><ge>0</ge></range> - </package> - <package> - <name>tomcat7</name> - <range><ge>0</ge></range> - </package> - <package> - <name>tomcat8</name> - <range><ge>0</ge></range> - </package> - <package> - <name>php55</name> - <range><ge>0</ge></range> - </package> - <package> - <name>php56</name> - <range><ge>0</ge></range> - </package> - <package> - <name>php70</name> - <range><ge>0</ge></range> - </package> - <package> - <name>nginx</name> - <range><ge>0</ge></range> - </package> - <package> - <name>go</name> - <range><lt>1.6.3</lt></range> - </package> - <package> - <name>go14</name> - <range><ge>0</ge></range> - </package> - <package> - <name>python27</name> - <range><ge>0</ge></range> - </package> - <package> - <name>python33</name> - <range><ge>0</ge></range> - </package> - <package> - <name>python34</name> - <range><ge>0</ge></range> - </package> - <package> - <name>python35</name> - <range><ge>0</ge></range> - </package> - <package> - <name>haproxy</name> - <range><ge>0</ge></range> - </package> - </affects> - <description> - <body xmlns="http://www.w3.org/1999/xhtml"> - <p>httpoxy.org reports:</p> - <blockquote cite="https://httpoxy.org/"> - <p>httpoxy is a set of vulnerabilities that affect application code - running in CGI, or CGI-like environments. It comes down to a simple - namespace conflict:.</p> - <ul><li>RFC 3875 (CGI) puts the HTTP Proxy header from a request into - the environment variables as HTTP_PROXY</li> - <li>HTTP_PROXY is a popular environment variable used to configure - an outgoing proxy</li></ul> - <p>This leads to a remotely exploitable vulnerability.</p> - </blockquote> - </body> - </description> - <references> - <url>https://httpoxy.org/</url> - <url>https://www.kb.cert.org/vuls/id/797896</url> - <url>CVE-2016-5385</url> - <url>CVE-2016-5386</url> - <url>CVE-2016-5387</url> - <url>CVE-2016-5388</url> - <url>CVE-2016-1000110</url> - </references> - <dates> - <discovery>2016-07-18</discovery> - <entry>2016-07-18</entry> - <modified>2016-07-19</modified> - </dates> - </vuln> - <vuln vid="00cb1469-4afc-11e6-97ea-002590263bf5"> <topic>atutor -- multiple vulnerabilites</topic> <affects> |