aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorstas <stas@FreeBSD.org>2008-09-10 18:53:02 +0800
committerstas <stas@FreeBSD.org>2008-09-10 18:53:02 +0800
commit889e269e48e52cf8b76a41f9784a44f3ca7509c5 (patch)
tree6bf3da8885e73fa0466ed3a26f503d372f1f3e9b /security
parent61aa54fad7c8f3530aa7518b588dccf39f92bc5d (diff)
downloadfreebsd-ports-gnome-889e269e48e52cf8b76a41f9784a44f3ca7509c5.tar.gz
freebsd-ports-gnome-889e269e48e52cf8b76a41f9784a44f3ca7509c5.tar.zst
freebsd-ports-gnome-889e269e48e52cf8b76a41f9784a44f3ca7509c5.zip
- Document wordpress, rails and mysql vulnerabilties.
Reviewed by: remko Approved by: portmgr (secteam approved: remko, blanket vuxml)
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml95
1 files changed, 95 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 985fe6374464..006b65aa6bb8 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,101 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="388d9ee4-7f22-11dd-a66a-0019666436c2">
+ <topic>mysql -- MyISAM table privileges secuity bypass vulnerability</topic>
+ <affects>
+ <package>
+ <name>mysql-server</name>
+ <range><ge>6.0</ge><lt>6.0.5</lt></range>
+ <range><ge>5.1</ge><lt>5.1.24</lt></range>
+ <range><ge>5.0</ge><lt>5.0.67</lt></range>
+ <range><ge>4.1</ge><lt>5.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>SecurityFocus reports:</p>
+ <blockquote cite="http://www.securityfocus.com/bid/29106/discuss">
+ <p>MySQL is prone to a security-bypass vulnerability.
+ An attacker can exploit this issue to overwrite existing
+ table files in the MySQL data directory, bypassing certain
+ security restrictions.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>29106</bid>
+ <cvename>CVE-2008-2079</cvename>
+ </references>
+ <dates>
+ <discovery>2008-05-05</discovery>
+ <entry>2008-09-10</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="8e8b8b94-7f1d-11dd-a66a-0019666436c2">
+ <topic>rubygem-rails -- SQL injection vulnerability</topic>
+ <affects>
+ <package>
+ <name>rubygem-rails</name>
+ <range><gt>0</gt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Jonathan Weiss reports, that it is possible
+ to perform an SQL injection in Rails applications
+ via not correctly sanitized :limit and :offset
+ parameters. It is possible to change arbitrary
+ values in affected tables or gain access to the
+ sensitive data.</p>
+ </body>
+ </description>
+ <references>
+ <url>http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1</url>
+ </references>
+ <dates>
+ <discovery>2008-09-08</discovery>
+ <entry>2008-09-10</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="884fced7-7f1c-11dd-a66a-0019666436c2">
+ <topic>wordpress -- remote privilege escalation</topic>
+ <affects>
+ <package>
+ <name>wordpress</name>
+ <name>wordpress-mu</name>
+ <name>de-wordpress</name>
+ <name>zh-wordpress</name>
+ <range><gt>0</gt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Wordpress development team reports:</p>
+ <blockquote cite="http://wordpress.org/development/2008/09/wordpress-262/">
+ <p>With open registration enabled, it is possible in WordPress
+ versions 2.6.1 and earlier to craft a username such that it
+ will allow resetting another users password to a randomly
+ generated password. The randomly generated password is not
+ disclosed to the attacker, so this problem by itself is annoying
+ but not a security exploit. However, this attack coupled with a
+ weakness in the random number seeding in mt_rand() could be used
+ to predict the randomly generated password.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>31068</bid>
+ <url>http://wordpress.org/development/2008/09/wordpress-262/</url>
+ </references>
+ <dates>
+ <discovery>2008-09-08</discovery>
+ <entry>2008-09-10</entry>
+ </dates>
+ </vuln>
+
<vuln vid="2f794295-7b69-11dd-80ba-000bcdf0a03b">
<topic>FreeBSD -- Remote kernel panics on IPv6 connections</topic>
<affects>