aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorOlli Hauer <ohauer@FreeBSD.org>2013-12-01 23:10:18 +0800
committerOlli Hauer <ohauer@FreeBSD.org>2013-12-01 23:10:18 +0800
commit37df5f700f2cbd7c7d4de78e1e745b0a6071fbcc (patch)
tree1d97042842fa3d2249733476a61398823c34fdff /security
parent3e00e55e12a24cc49676fcd125e76989ccf9efc7 (diff)
downloadfreebsd-ports-gnome-37df5f700f2cbd7c7d4de78e1e745b0a6071fbcc.tar.gz
freebsd-ports-gnome-37df5f700f2cbd7c7d4de78e1e745b0a6071fbcc.tar.zst
freebsd-ports-gnome-37df5f700f2cbd7c7d4de78e1e745b0a6071fbcc.zip
- security update to 3.3.1
This is a maintenance release that fixes a serious bug in the built-in HTTP server. It was discovered that the handle_request() routine did not properly perform input sanitization which led into a number of security vulnerabilities. An unauthenticated, remote attacker could exploit this flaw to execute arbitrary commands on the remote host. All users still using older versions are advised to upgrade to this version, which resolves this issue. Approved by: crees (maintainer, per PM) Security: 620cf713-5a99-11e3-878d-20cf30e32f6d
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml31
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 715de46fb16a..f8b2d732deeb 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,37 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="620cf713-5a99-11e3-878d-20cf30e32f6d">
+ <topic>monitorix -- serious bug in the built-in HTTP server</topic>
+ <affects>
+ <package>
+ <name>monitorix</name>
+ <range><lt>3.3.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Monitorix Project reports:</p>
+ <blockquote cite="http://www.monitorix.org/news.html#N331">
+ <p>A serious bug in the built-in HTTP server. It was discovered that the
+ handle_request() routine did not properly perform input sanitization
+ which led into a number of security vulnerabilities. An unauthenticated,
+ remote attacker could exploit this flaw to execute arbitrary commands on
+ the remote host. All users still using older versions are advised to
+ upgrade to this version, which resolves this issue.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://www.monitorix.org/news.html#N331</url>
+ <url>https://github.com/mikaku/Monitorix/issues/30</url>
+ </references>
+ <dates>
+ <discovery>2013-11-21</discovery>
+ <entry>2013-12-01</entry>
+ </dates>
+ </vuln>
+
<vuln vid="e3244a7b-5603-11e3-878d-20cf30e32f6d">
<topic>subversion -- multiple vulnerabilities</topic>
<affects>