diff options
author | stas <stas@FreeBSD.org> | 2008-09-10 18:53:02 +0800 |
---|---|---|
committer | stas <stas@FreeBSD.org> | 2008-09-10 18:53:02 +0800 |
commit | 889e269e48e52cf8b76a41f9784a44f3ca7509c5 (patch) | |
tree | 6bf3da8885e73fa0466ed3a26f503d372f1f3e9b /security | |
parent | 61aa54fad7c8f3530aa7518b588dccf39f92bc5d (diff) | |
download | freebsd-ports-gnome-889e269e48e52cf8b76a41f9784a44f3ca7509c5.tar.gz freebsd-ports-gnome-889e269e48e52cf8b76a41f9784a44f3ca7509c5.tar.zst freebsd-ports-gnome-889e269e48e52cf8b76a41f9784a44f3ca7509c5.zip |
- Document wordpress, rails and mysql vulnerabilties.
Reviewed by: remko
Approved by: portmgr (secteam approved: remko, blanket vuxml)
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 95 |
1 files changed, 95 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 985fe6374464..006b65aa6bb8 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,101 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="388d9ee4-7f22-11dd-a66a-0019666436c2"> + <topic>mysql -- MyISAM table privileges secuity bypass vulnerability</topic> + <affects> + <package> + <name>mysql-server</name> + <range><ge>6.0</ge><lt>6.0.5</lt></range> + <range><ge>5.1</ge><lt>5.1.24</lt></range> + <range><ge>5.0</ge><lt>5.0.67</lt></range> + <range><ge>4.1</ge><lt>5.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>SecurityFocus reports:</p> + <blockquote cite="http://www.securityfocus.com/bid/29106/discuss"> + <p>MySQL is prone to a security-bypass vulnerability. + An attacker can exploit this issue to overwrite existing + table files in the MySQL data directory, bypassing certain + security restrictions.</p> + </blockquote> + </body> + </description> + <references> + <bid>29106</bid> + <cvename>CVE-2008-2079</cvename> + </references> + <dates> + <discovery>2008-05-05</discovery> + <entry>2008-09-10</entry> + </dates> + </vuln> + + <vuln vid="8e8b8b94-7f1d-11dd-a66a-0019666436c2"> + <topic>rubygem-rails -- SQL injection vulnerability</topic> + <affects> + <package> + <name>rubygem-rails</name> + <range><gt>0</gt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Jonathan Weiss reports, that it is possible + to perform an SQL injection in Rails applications + via not correctly sanitized :limit and :offset + parameters. It is possible to change arbitrary + values in affected tables or gain access to the + sensitive data.</p> + </body> + </description> + <references> + <url>http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1</url> + </references> + <dates> + <discovery>2008-09-08</discovery> + <entry>2008-09-10</entry> + </dates> + </vuln> + + <vuln vid="884fced7-7f1c-11dd-a66a-0019666436c2"> + <topic>wordpress -- remote privilege escalation</topic> + <affects> + <package> + <name>wordpress</name> + <name>wordpress-mu</name> + <name>de-wordpress</name> + <name>zh-wordpress</name> + <range><gt>0</gt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Wordpress development team reports:</p> + <blockquote cite="http://wordpress.org/development/2008/09/wordpress-262/"> + <p>With open registration enabled, it is possible in WordPress + versions 2.6.1 and earlier to craft a username such that it + will allow resetting another users password to a randomly + generated password. The randomly generated password is not + disclosed to the attacker, so this problem by itself is annoying + but not a security exploit. However, this attack coupled with a + weakness in the random number seeding in mt_rand() could be used + to predict the randomly generated password.</p> + </blockquote> + </body> + </description> + <references> + <bid>31068</bid> + <url>http://wordpress.org/development/2008/09/wordpress-262/</url> + </references> + <dates> + <discovery>2008-09-08</discovery> + <entry>2008-09-10</entry> + </dates> + </vuln> + <vuln vid="2f794295-7b69-11dd-80ba-000bcdf0a03b"> <topic>FreeBSD -- Remote kernel panics on IPv6 connections</topic> <affects> |