aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorskv <skv@FreeBSD.org>2011-08-14 02:19:06 +0800
committerskv <skv@FreeBSD.org>2011-08-14 02:19:06 +0800
commit4bbe38206fb2a61f9cc5f0b4d28d6e0cf95ba205 (patch)
tree3b084f38fe7d3874f3db8cce9f193bdef78a1ddb /security
parentfdaa05b54659bf8d075ffcc0b0b08103cb3323e8 (diff)
downloadfreebsd-ports-gnome-4bbe38206fb2a61f9cc5f0b4d28d6e0cf95ba205.tar.gz
freebsd-ports-gnome-4bbe38206fb2a61f9cc5f0b4d28d6e0cf95ba205.tar.zst
freebsd-ports-gnome-4bbe38206fb2a61f9cc5f0b4d28d6e0cf95ba205.zip
Document "bugzilla" - multiple vulnerabilities.
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml62
1 files changed, 62 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 67b995d5a543..bdc6e0d4b42d 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,68 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="dc8741b9-c5d5-11e0-8a8e-00151735203a">
+ <topic>bugzilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>bugzilla</name>
+ <range><ge>2.4.*</ge><lt>3.6.6</lt></range>
+ <range><ge>4.0.*</ge><lt>4.0.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>A Bugzilla Security Advisory reports:</p>
+ <blockquote cite="http://www.bugzilla.org/security/3.4.11/">
+ <p>The following security issues have been discovered in Bugzilla:</p>
+ <ul>
+ <li>Internet Explorer 8 and older, and Safari before 5.0.6 do
+ content sniffing when viewing a patch in "Raw Unified" mode,
+ which could trigger a cross-site scripting attack due to
+ the execution of malicious code in the attachment.</li>
+ <li>It is possible to determine whether or not certain group names
+ exist while creating or updating bugs.</li>
+ <li>Attachment descriptions with a newline in them could lead
+ to the injection of crafted headers in email notifications sent
+ to the requestee or the requester when editing an attachment
+ flag.</li>
+ <li>If an attacker has access to a user's session, he can modify
+ that user's email address without that user being notified
+ of the change.</li>
+ <li>Temporary files for uploaded attachments are not deleted
+ on Windows, which could let a user with local access to
+ the server read them.</li>
+ <li>Up to Bugzilla 3.4.11, if a BUGLIST cookie is compromised,
+ it can be used to inject HTML code when viewing a bug report,
+ leading to a cross-site scripting attack.</li>
+ </ul>
+ <p>All affected installations are encouraged to upgrade as soon as
+ possible.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2011-2379</cvename>
+ <cvename>CVE-2011-2380</cvename>
+ <cvename>CVE-2011-2979</cvename>
+ <cvename>CVE-2011-2381</cvename>
+ <cvename>CVE-2011-2978</cvename>
+ <cvename>CVE-2011-2977</cvename>
+ <cvename>CVE-2011-2976</cvename>
+ <url>https://bugzilla.mozilla.org/show_bug.cgi?id=637981</url>
+ <url>https://bugzilla.mozilla.org/show_bug.cgi?id=653477</url>
+ <url>https://bugzilla.mozilla.org/show_bug.cgi?id=674497</url>
+ <url>https://bugzilla.mozilla.org/show_bug.cgi?id=657158</url>
+ <url>https://bugzilla.mozilla.org/show_bug.cgi?id=670868</url>
+ <url>https://bugzilla.mozilla.org/show_bug.cgi?id=660502</url>
+ <url>https://bugzilla.mozilla.org/show_bug.cgi?id=660053</url>
+ </references>
+ <dates>
+ <discovery>2011-08-04</discovery>
+ <entry>2011-08-13</entry>
+ </dates>
+ </vuln>
+
<vuln vid="879b0242-c5b6-11e0-abd1-0017f22d6707">
<topic>dtc -- multiple vulnerabilities</topic>
<affects>