diff options
author | ohauer <ohauer@FreeBSD.org> | 2013-07-06 05:06:15 +0800 |
---|---|---|
committer | ohauer <ohauer@FreeBSD.org> | 2013-07-06 05:06:15 +0800 |
commit | f74e32bde5d9676cb2da699dcaca4c9b6f85be28 (patch) | |
tree | 9a566b07d131908b7b2bafc92145030fefd0034a /security/vuxml | |
parent | 445b3f7333ec3e5d867adc9a5b1e6d26a693eba7 (diff) | |
download | freebsd-ports-gnome-f74e32bde5d9676cb2da699dcaca4c9b6f85be28.tar.gz freebsd-ports-gnome-f74e32bde5d9676cb2da699dcaca4c9b6f85be28.tar.zst freebsd-ports-gnome-f74e32bde5d9676cb2da699dcaca4c9b6f85be28.zip |
- document apache22 CVE-2013-1862 (mod_rewrite)
Update to apache22-2.2.25 is ready to commit.
Until now there is no official announcement from apache.org
so we hold the update back until we have official checksums.
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 45 |
1 files changed, 45 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index d109da19a03c..5f41cd552ba6 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -51,6 +51,51 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="f3d24aee-e5ad-11e2-b183-20cf30e32f6d"> + <topic>apache22 -- mod_rewrite vulnerability</topic> + <affects> + <package> + <name>apache22</name> + <range><gt>2.2.0</gt><lt>2.2.25</lt></range> + </package> + <package> + <name>apache22-event-mpm</name> + <range><gt>2.2.0</gt><lt>2.2.25</lt></range> + </package> + <package> + <name>apache22-itk-mpm</name> + <range><gt>2.2.0</gt><lt>2.2.25</lt></range> + </package> + <package> + <name>apache22-peruser-mpm</name> + <range><gt>2.2.0</gt><lt>2.2.25</lt></range> + </package> + <package> + <name>apache22-worker-mpm</name> + <range><gt>2.2.0</gt><lt>2.2.25</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Apache HTTP SERVER PROJECT reports:</h1> + <blockquote cite="http://www.apache.org/dist/httpd/CHANGES_2.2.25"> + <p>The mod_rewrite module in the Apache HTTP Server 2.2.x before + 2.2.25 writes data to a log file without sanitizing + non-printable characters, which might allow remote attackers to + execute arbitrary commands via an HTTP request containing an + escape sequence for a terminal emulator.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2013-1862</cvename> + </references> + <dates> + <discovery>2013-06-21</discovery> + <entry>2013-07-05</entry> + </dates> + </vuln> + <vuln vid="1b93f6fe-e1c1-11e2-948d-6805ca0b3d42"> <topic>phpMyAdmin -- Global variable scope injection</topic> <affects> |