diff options
author | brnrd <brnrd@FreeBSD.org> | 2016-01-28 00:01:39 +0800 |
---|---|---|
committer | brnrd <brnrd@FreeBSD.org> | 2016-01-28 00:01:39 +0800 |
commit | e7c2eebd9dcf963d2ff3c157a4de7bec2c58bd89 (patch) | |
tree | 6140b2fe0a05c753f2ed2cf5a28ab186a90422fa /security | |
parent | 1e0eb7ae071f205cf026ea1307090ed749a04fed (diff) | |
download | freebsd-ports-gnome-e7c2eebd9dcf963d2ff3c157a4de7bec2c58bd89.tar.gz freebsd-ports-gnome-e7c2eebd9dcf963d2ff3c157a4de7bec2c58bd89.tar.zst freebsd-ports-gnome-e7c2eebd9dcf963d2ff3c157a4de7bec2c58bd89.zip |
security/vuxml: Document cURL vulnerability
Reviewed by: feld (ports-secteam, mentor), koobs (mentor)
Approved by: feld (ports-secteam, mentor)
Security: CVE-2016-0755
Security: https://vuxml.FreeBSD.org/freebsd/8b27f1bc-c509-11e5-a95f-b499baebfeaf.html
Differential Revision: D5091
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 30 |
1 files changed, 30 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 0ab49c80807c..999403e64a00 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,36 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="8b27f1bc-c509-11e5-a95f-b499baebfeaf"> + <topic>curl -- Credentials not checked</topic> + <affects> + <package> + <name>curl</name> + <range><ge>7.10.0</ge></range> + <range><lt>7.47.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The cURL project reports:</p> + <blockquote cite="http://curl.haxx.se/docs/adv_20160127A.html"> + <p>libcurl will reuse NTLM-authenticated proxy connections + without properly making sure that the connection was + authenticated with the same credentials as set for this + transfer.</p> + </blockquote> + </body> + </description> + <references> + <url>http://curl.haxx.se/docs/adv_20160127A.html</url> + <cvename>CVE-2016-0755</cvename> + </references> + <dates> + <discovery>2016-01-27</discovery> + <entry>2016-01-27</entry> + </dates> + </vuln> + <vuln vid="fb754341-c3e2-11e5-b5fe-002590263bf5"> <topic>wordpress -- XSS vulnerability</topic> <affects> |