aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authordelphij <delphij@FreeBSD.org>2015-07-01 08:09:31 +0800
committerdelphij <delphij@FreeBSD.org>2015-07-01 08:09:31 +0800
commit195628a5389d3eb0575317c33b4d0625c82fa0c4 (patch)
treedfe5a49fec70eba554ede152c325f119b1172d5c /security
parent9f1eb78c93374218be0f77907abb8b3137eed891 (diff)
downloadfreebsd-ports-gnome-195628a5389d3eb0575317c33b4d0625c82fa0c4.tar.gz
freebsd-ports-gnome-195628a5389d3eb0575317c33b4d0625c82fa0c4.tar.zst
freebsd-ports-gnome-195628a5389d3eb0575317c33b4d0625c82fa0c4.zip
Document games/wesnoth authentication information disclosure vulnerability.
PR: 201105 Submitted by: Jason Unovitch
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml40
1 files changed, 40 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 73a3c9e2f5a6..ab426bfdd9ef 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -57,6 +57,46 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="2a8b7d21-1ecc-11e5-a4a5-002590263bf5">
+ <topic>wesnoth -- disclosure of .pbl files with lowercase, uppercase, and mixed-case extension</topic>
+ <affects>
+ <package>
+ <name>wesnoth</name>
+ <range><lt>1.12.4,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Ignacio R. Morelle reports:</p>
+ <blockquote cite="http://forums.wesnoth.org/viewtopic.php?t=42776">
+ <p>As mentioned in the Wesnoth 1.12.4 and Wesnoth 1.13.1 release
+ announcements, a security vulnerability targeting add-on authors
+ was found (bug #23504) which allowed a malicious user to obtain
+ add-on server passphrases from the client's .pbl files and transmit
+ them over the network, or store them in saved game files intended
+ to be shared by the victim. This vulnerability affects all existing
+ releases up to and including versions 1.12.2 and 1.13.0.
+ Additionally, version 1.12.3 included only a partial fix that failed
+ to guard users against attempts to read from .pbl files with an
+ uppercase or mixed-case extension. CVE-2015-5069 and CVE-2015-5070
+ have been assigned to the vulnerability affecting .pbl files with a
+ lowercase extension, and .pbl files with an uppercase or mixed-case
+ extension, respectively.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2015-5069</cvename>
+ <cvename>CVE-2015-5070</cvename>
+ <url>http://forums.wesnoth.org/viewtopic.php?t=42776</url>
+ <url>http://forums.wesnoth.org/viewtopic.php?t=42775</url>
+ </references>
+ <dates>
+ <discovery>2015-06-28</discovery>
+ <entry>2015-07-01</entry>
+ </dates>
+ </vuln>
+
<vuln vid="b19da422-1e02-11e5-b43d-002590263bf5">
<topic>cups-filters -- buffer overflow in texttopdf size allocation</topic>
<affects>