aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authormandree <mandree@FreeBSD.org>2013-08-13 14:17:32 +0800
committermandree <mandree@FreeBSD.org>2013-08-13 14:17:32 +0800
commit529b03ec4cab2f6962e6d8ffd45fe7b5f570f768 (patch)
treefe53e70b96f7f3f5452373d60ed56834245436c5 /security/vuxml
parent551701ccee503d1ce01df767521fbbcee7b3a10f (diff)
downloadfreebsd-ports-gnome-529b03ec4cab2f6962e6d8ffd45fe7b5f570f768.tar.gz
freebsd-ports-gnome-529b03ec4cab2f6962e6d8ffd45fe7b5f570f768.tar.zst
freebsd-ports-gnome-529b03ec4cab2f6962e6d8ffd45fe7b5f570f768.zip
Record PolarSSL < 1.2.8 infinite loop denial of service.
Note: the port has not yet been upgraded, and the fix then needs to be merged to the 9.2 ports branch before release.
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml29
1 files changed, 29 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 1b6ba70a9452..6ff8dc223b7b 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,35 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="72bf9e21-03df-11e3-bd8d-080027ef73ec">
+ <topic>polarssl -- denial of service through unterminated loop in certificate parser</topic>
+ <affects>
+ <package>
+ <name>polarssl</name>
+ <range><lt>1.2.8</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Paul Bakker reports:</p>
+ <blockquote cite="https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2013-03">
+ <p>A bug in the logic of the parsing of PEM encoded certificates in x509parse_crt() can result in an infinite loop, thus hogging processing power.
+ </p><p>
+ While parsing a Certificate message during the SSL/TLS handshake, PolarSSL extracts the presented certificates and sends them on to be parsed. As the RFC specifies that the certificates in the Certificate message are always X.509 certificates in DER format, bugs in the decoding of PEM certificates should normally not be triggerable via the SSL/TLS handshake.
+ </p><p>
+ Versions of PolarSSL prior to 1.1.7 in the 1.1 branch and prior to 1.2.8 in the 1.2 branch call the generic x509parse_crt() function for parsing during the handshake. x509parse_crt() is a generic functions that wraps parsing of both PEM-encoded and DER-formatted certificates. As a result it is possible to craft a Certificate message that includes a PEM encoded certificate in the Certificate message that triggers the infinite loop.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2013-03</url>
+ </references>
+ <dates>
+ <discovery>2013-06-21</discovery>
+ <entry>2013-08-13</entry>
+ </dates>
+ </vuln>
+
<vuln vid="e21c7c7a-0116-11e3-9e83-3c970e169bc2">
<topic>samba -- denial of service vulnerability</topic>
<affects>