diff options
author | delphij <delphij@FreeBSD.org> | 2015-06-11 02:09:20 +0800 |
---|---|---|
committer | delphij <delphij@FreeBSD.org> | 2015-06-11 02:09:20 +0800 |
commit | e420e36b83b23d01d35b5eb4618a5a84b4496911 (patch) | |
tree | 38e617242b6547dd48329405e647f86abba92486 /security | |
parent | ad8a6ac2fd569713e00ea2e4a50cf665028c24d5 (diff) | |
download | freebsd-ports-gnome-e420e36b83b23d01d35b5eb4618a5a84b4496911.tar.gz freebsd-ports-gnome-e420e36b83b23d01d35b5eb4618a5a84b4496911.tar.zst freebsd-ports-gnome-e420e36b83b23d01d35b5eb4618a5a84b4496911.zip |
Document libzmq4 V3 protocol handler protocol downgrade vulnerability.
PR: 200502
Submitted by: Jason Unovitch
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index d7eb55aea837..22eeea6e21e6 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -57,6 +57,37 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="10a6d0aa-0b1c-11e5-bb90-002590263bf5"> + <topic>libzmq4 -- V3 protocol handler vulnerable to downgrade attacks</topic> + <affects> + <package> + <name>libzmq4</name> + <range><ge>4.0.0</ge><lt>4.0.6</lt></range> + <range><ge>4.1.0</ge><lt>4.1.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Pieter Hintjens reports:</p> + <blockquote cite="https://github.com/zeromq/libzmq/issues/1273"> + <p>It is easy to bypass the security mechanism in 4.1.0 and 4.0.5 by + sending a ZMTP v2 or earlier header. The library accepts such + connections without applying its security mechanism.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2014-9721</cvename> + <url>https://github.com/zeromq/libzmq/issues/1273</url> + <mlist>http://www.openwall.com/lists/oss-security/2015/05/07/8</mlist> + <freebsdpr>200502</freebsdpr> + </references> + <dates> + <discovery>2014-12-04</discovery> + <entry>2015-06-10</entry> + </dates> + </vuln> + <vuln vid="8fbd4187-0f18-11e5-b6a8-002590263bf5"> <topic>pgbouncer -- remote denial of service</topic> <affects> |