aboutsummaryrefslogtreecommitdiffstats
path: root/ports-mgmt
diff options
context:
space:
mode:
authoreik <eik@FreeBSD.org>2004-09-04 04:27:26 +0800
committereik <eik@FreeBSD.org>2004-09-04 04:27:26 +0800
commit8ddf321c2394822d4f4f51eb14dd6fe096791d7d (patch)
tree909e9daa675ff324c98474baaa5743c0969a778b /ports-mgmt
parent4eb9a473769915662849e4e91e1974b692b1be48 (diff)
downloadfreebsd-ports-gnome-8ddf321c2394822d4f4f51eb14dd6fe096791d7d.tar.gz
freebsd-ports-gnome-8ddf321c2394822d4f4f51eb14dd6fe096791d7d.tar.zst
freebsd-ports-gnome-8ddf321c2394822d4f4f51eb14dd6fe096791d7d.zip
- add some references
- extend ImageMagick entry - squid ntlm authentication helper DoS - multiple vpopmail vulnerabilities - first attempts to check the base system for vulnerabilities: + cvs server code + zlib DoS - BSD license portaudit.xml
Diffstat (limited to 'ports-mgmt')
-rw-r--r--ports-mgmt/portaudit-db/database/portaudit.txt5
-rw-r--r--ports-mgmt/portaudit-db/database/portaudit.xlist2
-rw-r--r--ports-mgmt/portaudit-db/database/portaudit.xml143
3 files changed, 142 insertions, 8 deletions
diff --git a/ports-mgmt/portaudit-db/database/portaudit.txt b/ports-mgmt/portaudit-db/database/portaudit.txt
index 4bef4d0585ef..d34dbf954214 100644
--- a/ports-mgmt/portaudit-db/database/portaudit.txt
+++ b/ports-mgmt/portaudit-db/database/portaudit.txt
@@ -28,7 +28,7 @@ sqwebmail<4.0.5|http://www.securityfocus.com/archive/1/366595|Sqwebmail XSS vuln
isc-dhcp3<3.0.1.r11|http://www.cert.org/advisories/CA-2003-01.html http://www.kb.cert.org/vuls/id/284857 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0026|ISC DHCPD minires library contains multiple buffer overflows|f71745cd-c509-11d8-8898-000d6111a684
isc-dhcp3<3.0.1.r11_1|http://www.kb.cert.org/vuls/id/149953 http://www.securityfocus.com/bid/6628 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0039|ISC "dhcrelay" fails to limit hop count when malicious bootp packet is received|02957734-c50b-11d8-8898-000d6111a684
icecast2<2.0.1,1|http://secunia.com/advisories/11578 http://www.osvdb.org/6075|Icecast remote DoS vulnerability|8de7cf18-c5ca-11d8-8898-000d6111a684
-rssh<2.2.1|http://secunia.com/advisories/11926 http://www.securityfocus.com/archive/1/366691|rssh file existence information disclosure weakness|a4815970-c5cc-11d8-8898-000d6111a684
+rssh<2.2.1|http://secunia.com/advisories/11926 http://www.securityfocus.com/archive/1/366691 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0609 http://www.securityfocus.com/bid/10574 http://www.osvdb.org/7239|rssh file existence information disclosure weakness|a4815970-c5cc-11d8-8898-000d6111a684
sup<=2.0|http://secunia.com/advisories/11898 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0451|CMU SUP logging format string vulnerabilities|238ea8eb-c5cf-11d8-8898-000d6111a684
rlpr<2.04_1|http://secunia.com/advisories/11906 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0393 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0454 http://www.osvdb.org/7194 http://www.osvdb.org/7195 http://securitytracker.com/id?1010545 http://www.securityfocus.com/archive/1/367045|rlpr "msg()" buffer overflow and format string vulnerabilities|29a72da5-c5ea-11d8-8898-000d6111a684
pure-ftpd<1.0.19|http://www.pureftpd.org/ http://www.osvdb.org/7415|Pure-FTPd DoS when maximum number of connections is reached|ec5cf461-c691-11d8-8898-000d6111a684
@@ -73,3 +73,6 @@ cdrtools-cjk<2.0.3.20030714_4|ftp://ftp.berlios.de/pub/cdrecord/alpha/AN-2.01a38
cdrtools-devel<2.01a38|ftp://ftp.berlios.de/pub/cdrecord/alpha/AN-2.01a38|security bug in rscsi client code|fdbbed57-f933-11d8-a776-00e081220a76
{ja-,ru-,}gaim<0.82|http://www.osvdb.org/9261 http://www.osvdb.org/9262 http://www.osvdb.org/9263 http://www.osvdb.org/9264 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0754 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0784 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0785 http://www.securityfocus.com/bid/11056 http://gaim.sourceforge.net/security/index.php|multiple vulnerabilities in gaim|8b29b312-fa6e-11d8-81b0-000347a4fa7d
{ja-,}samba<2.2.11.*|http://www.samba.org/samba/history/samba-2.2.11.html http://secunia.com/advisories/12397 http://www.osvdb.org/9362|samba printer change notification request DoS|d8ce23a5-fadc-11d8-81b0-000347a4fa7d
+squid>=2.5.*<2.5.6_7|http://secunia.com/advisories/12444 http://www.squid-cache.org/bugs/show_bug.cgi?id=1045|squid ntlm authentication helper DoS|7c351421-fdbd-11d8-81b0-000347a4fa7d
+FreeBSD>=502120<503000|http://secunia.com/advisories/11129 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0797 http://www.osvdb.org/9360 http://www.osvdb.org/9361|zlib DoS vulnerability|1b98165f-fdd9-11d8-81b0-000347a4fa7d
+FreeBSD>=600000<600001|http://secunia.com/advisories/11129 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0797 http://www.osvdb.org/9360 http://www.osvdb.org/9361|zlib DoS vulnerability|1b98165f-fdd9-11d8-81b0-000347a4fa7d
diff --git a/ports-mgmt/portaudit-db/database/portaudit.xlist b/ports-mgmt/portaudit-db/database/portaudit.xlist
index 33eed473166e..034472c025f7 100644
--- a/ports-mgmt/portaudit-db/database/portaudit.xlist
+++ b/ports-mgmt/portaudit-db/database/portaudit.xlist
@@ -22,3 +22,5 @@ a713c0f9-ec54-11d8-9440-000347a4fa7d
e811aaf1-f015-11d8-876f-00902714cc7c
ebffe27a-f48c-11d8-9837-000c41e2cdad
0d3a5148-f512-11d8-9837-000c41e2cdad
+b6cad7f3-fb59-11d8-9837-000c41e2cdad
+d2102505-f03d-11d8-81b0-000347a4fa7d
diff --git a/ports-mgmt/portaudit-db/database/portaudit.xml b/ports-mgmt/portaudit-db/database/portaudit.xml
index f50f0c935e7b..e29c8733c744 100644
--- a/ports-mgmt/portaudit-db/database/portaudit.xml
+++ b/ports-mgmt/portaudit-db/database/portaudit.xml
@@ -1,7 +1,35 @@
<?xml version="1.0" encoding="utf-8"?>
<!--
-This file is in the public domain.
+Copyright (c) 2004 Oliver Eikemeier
+
+Redistribution and use in source (XML) and 'compiled' forms (SGML,
+HTML, PDF, PostScript, RTF and so forth) with or without modification,
+are permitted provided that the following conditions are met:
+
+- Redistributions of source code (XML) must retain the above copyright
+ notice, this list of conditions and the following disclaimer as
+ the first lines of this file unmodified.
+
+- Redistributions in compiled form (transformed to other DTDs,
+ converted to PDF, PostScript, RTF and other formats) must reproduce
+ the above copyright notice, this list of conditions and the
+ following disclaimer in the documentation and/or other materials
+ provided with the distribution.
+
+THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR "AS IS" AND ANY EXPRESS
+OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
+WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
+DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
+GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
+IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
+OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,
+EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
$FreeBSD$
+
-->
<!DOCTYPE vuxml PUBLIC "-//vuxml.org//DTD VuXML 1.1//EN" "http://www.vuxml.org/dtd/vuxml-1/vuxml-11.dtd">
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
@@ -359,6 +387,7 @@ This file is in the public domain.
<url>http://secunia.com/advisories/11505</url>
<url>http://www.osvdb.org/5726</url>
<bid>10244</bid>
+ <url>http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7</url>
</references>
<dates>
<discovery>2004-04-29</discovery>
@@ -391,6 +420,10 @@ This file is in the public domain.
<url>http://www.osvdb.org/7475</url>
<url>http://www.osvdb.org/7476</url>
<mlist msgid="Pine.LNX.4.44.0407080940550.9602-200000@pineapple.shacknet.nu">http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0003.html</mlist>
+ <cvename>CAN-2004-0627</cvename>
+ <cvename>CAN-2004-0628</cvename>
+ <certvu>184030</certvu>
+ <certvu>645326</certvu>
</references>
<dates>
<discovery>2004-07-01</discovery>
@@ -639,6 +672,7 @@ This file is in the public domain.
<url>http://secunia.com/advisories/12219</url>
<url>http://secunia.com/advisories/12232</url>
<url>http://bugzilla.mozilla.org/show_bug.cgi?id=251381</url>
+ <url>http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.2</url>
<uscertta>TA04-217A</uscertta>
<url>http://dl.sourceforge.net/sourceforge/libpng/ADVISORY.txt</url>
</references>
@@ -685,6 +719,7 @@ This file is in the public domain.
<url>http://www.cipher.org.uk/index.php?p=advisories/Certificate_Spoofing_Mozilla_FireFox_25-07-2004.advisory</url>
<url>http://secunia.com/advisories/12160</url>
<url>http://bugzilla.mozilla.org/show_bug.cgi?id=253121</url>
+ <url>http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.2</url>
<url>http://www.osvdb.org/8238</url>
<bid>10796</bid>
<cvename>CAN-2004-0763</cvename>
@@ -697,17 +732,19 @@ This file is in the public domain.
</vuln>
<vuln vid="a713c0f9-ec54-11d8-9440-000347a4fa7d">
- <topic>ImageMagick png vulnerability fix</topic>
+ <topic>ImageMagick png and bmp vulnerabilities</topic>
<affects>
<package>
<name>ImageMagick{,-nox11}</name>
- <range><lt>6.0.4.2</lt></range>
+ <range><lt>6.0.6</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Glenn Randers-Pehrson has contributed a fix for the png
vulnerabilities discovered by Chris Evans.</p>
+ <p>Furthermore, Marcus Meissner has discovered and patched a buffer
+ overrun associated with decoding runlength-encoded BMP images.</p>
</body>
</description>
<references>
@@ -715,11 +752,12 @@ This file is in the public domain.
<url>http://freshmeat.net/releases/169228</url>
<url>http://secunia.com/advisories/12236</url>
<url>http://www.freebsd.org/ports/portaudit/f9e3e60b-e650-11d8-9b0a-000347a4fa7d.html</url>
+ <url>http://studio.imagemagick.org/pipermail/magick-developers/2004-August/002011.html</url>
</references>
<dates>
<discovery>2004-08-04</discovery>
<entry>2004-08-04</entry>
- <modified>2004-08-12</modified>
+ <modified>2004-09-03</modified>
</dates>
</vuln>
@@ -738,13 +776,13 @@ This file is in the public domain.
</body>
</description>
<references>
- <mlist>http://www.securityfocus.com/archive/1/370955</mlist>
+ <mlist msgid="20040805175709.6995.qmail@web50508.mail.yahoo.com">http://www.securityfocus.com/archive/1/370955</mlist>
<url>http://secunia.com/advisories/12090</url>
<url>http://www.osvdb.org/8373</url>
<url>http://www.cvstrac.org/cvstrac/chngview?cn=316</url>
</references>
<dates>
- <discovery>2000-00-00</discovery>
+ <discovery>2004-08-05</discovery>
<entry>2004-08-13</entry>
</dates>
</vuln>
@@ -869,7 +907,7 @@ This file is in the public domain.
<url>http://xforce.iss.net/xforce/xfdb/17042</url>
</references>
<dates>
- <discovery>2000-08-18</discovery>
+ <discovery>2004-08-18</discovery>
<entry>2004-08-20</entry>
</dates>
</vuln>
@@ -895,10 +933,101 @@ This file is in the public domain.
<references>
<url>http://secunia.com/advisories/12255</url>
<mlist msgid="20040805034902.6DF465900BB@radish.jmason.org>">http://marc.theaimsgroup.com/?l=spamassassin-announce&amp;m=109168121628767&amp;w=2</mlist>
+ <cvename>CAN-2004-0796</cvename>
+ <bid>10957</bid>
</references>
<dates>
<discovery>2004-08-05</discovery>
<entry>2004-08-10</entry>
</dates>
</vuln>
+
+ <vuln vid="77cc070b-fdbe-11d8-81b0-000347a4fa7d">
+ <topic>vpopmail multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>vpopmail</name>
+ <range><lt>5.4.6</lt></range>
+ </package>
+ <package>
+ <name>vpopmail-devel</name>
+ <range><lt>5.5.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Inter7 vpopmail (vchkpw) versions 5.4.2 and earlier contain
+ buffer overflows and format string vulnerabilities in the file vsybase.c</p>
+ <p>The buffer overflows are not fixed in versions 5.4.6/5.5.0, but are
+ believed to be very hard to exploit, and only by administrators able to add users.</p>
+ </body>
+ </description>
+ <references>
+ <url>http://www.osvdb.org/9146</url>
+ <url>http://www.osvdb.org/9147</url>
+ <url>http://www.osvdb.org/9148</url>
+ <bid>10962</bid>
+ <url>http://secunia.com/advisories/12441</url>
+ <url>http://cvs.sourceforge.net/viewcvs.py/vpopmail/vpopmail/vsybase.c?r1=1.9.2.1&amp;r2=1.9.2.2</url>
+ <url>http://www.kupchino.org.ru/unl0ck/advisories/vpopmail.txt</url>
+ <mlist msgid="200408181347.12199.bugtraq@beyondsecurity.com">http://www.securityfocus.com/archive/1/372257</mlist>
+ <mlist msgid="58114.66.79.185.80.1092936304.squirrel@mail.xyxx.com">http://www.securityfocus.com/archive/1/372468</mlist>
+ <url>http://xforce.iss.net/xforce/xfdb/17016</url>
+ <url>http://xforce.iss.net/xforce/xfdb/17017</url>
+ <url>http://security.gentoo.org/glsa/glsa-200409-01.xml</url>
+ </references>
+ <dates>
+ <discovery>2004-08-17</discovery>
+ <entry>2004-09-03</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="d2102505-f03d-11d8-81b0-000347a4fa7d">
+ <topic>multiple vulnerabilities in the cvs server code</topic>
+ <affects>
+ <package>
+ <name>cvs+ipv6</name>
+ <range><lt>1.11.17</lt></range>
+ </package>
+ <package>
+ <name>FreeBSD</name>
+ <range><le>491101</le></range>
+ <range><ge>500000</ge><lt>502114</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Stefan Esser reports multiple remote exploitable vulnerabilites
+ in the cvs code base.</p>
+ <p>Additionaly there exists an undocumented switch to the history
+ command allows an attacker to determine whether arbitrary files
+ exist and whether the CVS process can access them.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CAN-2004-0414</cvename>
+ <cvename>CAN-2004-0416</cvename>
+ <cvename>CAN-2004-0417</cvename>
+ <cvename>CAN-2004-0418</cvename>
+ <cvename>CAN-2004-0778</cvename>
+ <url>http://secunia.com/advisories/11817</url>
+ <url>http://secunia.com/advisories/12309</url>
+ <url>http://security.e-matters.de/advisories/092004.html</url>
+ <url>http://www.idefense.com/application/poi/display?id=130&amp;type=vulnerabilities&amp;flashstatus=false</url>
+ <url>https://ccvs.cvshome.org/source/browse/ccvs/NEWS?rev=1.116.2.104</url>
+ <url>http://www.osvdb.org/6830</url>
+ <url>http://www.osvdb.org/6831</url>
+ <url>http://www.osvdb.org/6832</url>
+ <url>http://www.osvdb.org/6833</url>
+ <url>http://www.osvdb.org/6834</url>
+ <url>http://www.osvdb.org/6835</url>
+ <url>http://www.osvdb.org/6836</url>
+ <url>http://www.packetstormsecurity.org/0405-exploits/cvs_linux_freebsd_HEAP.c</url>
+ <bid>10499</bid>
+ </references>
+ <dates>
+ <discovery>2004-05-20</discovery>
+ <entry>2004-08-17</entry>
+ </dates>
+ </vuln>
</vuxml>