aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorAlexey Dokuchaev <danfe@FreeBSD.org>2012-04-22 15:22:21 +0000
committerAlexey Dokuchaev <danfe@FreeBSD.org>2012-04-22 15:22:21 +0000
commit2405c678115dc01e7286555d1a083ba1ccef47c8 (patch)
treeebc6cf90bca9bf018c5baea6bcb8512a5f1d2953 /security
parentbdceeeca5bf30f3710f1d4df191359bce5f84ba3 (diff)
downloadports-2405c678115dc01e7286555d1a083ba1ccef47c8.tar.gz
ports-2405c678115dc01e7286555d1a083ba1ccef47c8.zip
Fix whitespace: run through unexpand(1), spelling, wrap overly long lines.
Notes
Notes: svn path=/head/; revision=295261
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml118
1 files changed, 58 insertions, 60 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 188b7f5b9d19..98a79da45a2b 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -101,17 +101,15 @@ Note: Please add new entries to the beginning of this file.
<p>Due to a lack of proper validation of the X-FORWARDED-FOR
header of an authentication request, an attacker could bypass
the current lockout policy used for protection against brute-
- force password discovery. This vulnerability can only be
- exploited if the 'inbound_proxies' parameter is set.
- </p>
+ force password discovery. This vulnerability can only be
+ exploited if the 'inbound_proxies' parameter is set.</p>
<h1>Cross Site Scripting</h1>
<p>A JavaScript template used by buglist.cgi could be used
by a malicious script to permit an attacker to gain access
to some information about bugs he would not normally be
- allowed to see, using the victim's credentials. To be
+ allowed to see, using the victim's credentials. To be
exploitable, the victim must be logged in when visiting
- the attacker's malicious page.
- </p>
+ the attacker's malicious page.</p>
<p>All affected installations are encouraged to upgrade as soon as
possible.</p>
</blockquote>
@@ -143,20 +141,21 @@ Note: Please add new entries to the beginning of this file.
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Typo Security Team reports:</p>
<blockquote cite="https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-002/">
- <p> Failing to properly encode the output, the default TYPO3 Exception
- Handler is susceptible to Cross-Site Scripting. We are not aware of
- a possibilty to exploit this vulnerability without third party
- extensions being installed that put user input in exception messages.
- However it has come to our attention that extensions using the extbase
- MVC framework can be used to exploit this vulnerability if these
- extensions accept objects in controller actions.</p>
+ <p>Failing to properly encode the output, the default TYPO3
+ Exception Handler is susceptible to Cross-Site Scripting. We
+ are not aware of a possibility to exploit this vulnerability
+ without third party extensions being installed that put user
+ input in exception messages. However, it has come to our
+ attention that extensions using the extbase MVC framework can
+ be used to exploit this vulnerability if these extensions
+ accept objects in controller actions.</p>
</blockquote>
</body>
</description>
<references>
- <cvename>CVE-2012-2112</cvename>
- <url>https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-002/</url>
- </references>
+ <cvename>CVE-2012-2112</cvename>
+ <url>https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-002/</url>
+ </references>
<dates>
<discovery>2012-04-17</discovery>
<entry>2012-04-18</entry>
@@ -205,9 +204,9 @@ Note: Please add new entries to the beginning of this file.
<body xmlns="http://www.w3.org/1999/xhtml">
<p>The phpMyFAQ project reports:</p>
<blockquote cite="http://www.phpmyfaq.de/advisory_2011-10-25.php">
- <p>The bundled ImageManager library allows injection of arbitrary PHP
- code to execute arbitrary php code and upload malware and trojan
- horses.</p>
+ <p>The bundled ImageManager library allows injection of arbitrary
+ PHP code to execute arbitrary PHP code and upload malware and
+ trojan horses.</p>
</blockquote>
</body>
</description>
@@ -230,12 +229,12 @@ Note: Please add new entries to the beginning of this file.
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <blockquote cite="http://puppetlabs.com/security/">
+ <blockquote cite="http://puppetlabs.com/security/">
<p>Multiple vulnerabilities exist in puppet that can result in
- arbitrary code execution, arbitrary file read access, denial of
- service, and arbitrary file write access. Please review the
- details in each of the CVEs for additional information.</p>
- </blockquote>
+ arbitrary code execution, arbitrary file read access, denial of
+ service, and arbitrary file write access. Please review the
+ details in each of the CVEs for additional information.</p>
+ </blockquote>
</body>
</description>
<references>
@@ -309,18 +308,16 @@ Note: Please add new entries to the beginning of this file.
<blockquote cite="http://www.bugzilla.org/security/4.0.4/">
<p>The following security issues have been discovered in Bugzilla:</p>
<ul>
- <li>Due to a lack of validation of the enctype form
- attribute when making POST requests to xmlrpc.cgi,
- a possible CSRF vulnerability was discovered. If a user
- visits an HTML page with some malicious HTML code in it,
- an attacker could make changes to a remote Bugzilla installation
- on behalf of the victim's account by using the XML-RPC API
- on a site running mod_perl. Sites running under mod_cgi
- are not affected. Also the user would have had to be
- already logged in to the target site for the vulnerability
- to work.
- </li>
- </ul>
+ <li>Due to a lack of validation of the enctype form attribute
+ when making POST requests to xmlrpc.cgi, a possible CSRF
+ vulnerability was discovered. If a user visits an HTML page
+ with some malicious HTML code in it, an attacker could make
+ changes to a remote Bugzilla installation on behalf of the
+ victim's account by using the XML-RPC API on a site running
+ mod_perl. Sites running under mod_cgi are not affected.
+ Also, the user would have had to be already logged in to the
+ target site for the vulnerability to work.</li>
+ </ul>
<p>All affected installations are encouraged to upgrade as soon as
possible.</p>
</blockquote>
@@ -2087,17 +2084,18 @@ Note: Please add new entries to the beginning of this file.
<topic>mathopd - directory traversal vulnerability</topic>
<affects>
<package>
- <name>mathopd</name>
- <range><lt>1.5p7</lt></range>
+ <name>mathopd</name>
+ <range><lt>1.5p7</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>Michiel Boland reports:</p>
- <blockquote cite="http://www.mathopd.org/security.html">
- <p>The software has a vulnerability that could lead to directory
- traversal if the '*' construct for mass virtual hosting is used.</p>
- </blockquote>
+ <p>Michiel Boland reports:</p>
+ <blockquote cite="http://www.mathopd.org/security.html">
+ <p>The software has a vulnerability that could lead to directory
+ traversal if the '*' construct for mass virtual hosting is
+ used.</p>
+ </blockquote>
</body>
</description>
<references>
@@ -2755,31 +2753,31 @@ Note: Please add new entries to the beginning of this file.
<topic>tomcat -- Denial of Service</topic>
<affects>
<package>
- <name>tomcat</name>
- <range><gt>5.5.0</gt><lt>5.5.35</lt></range>
+ <name>tomcat</name>
+ <range><gt>5.5.0</gt><lt>5.5.35</lt></range>
</package>
<package>
- <name>tomcat</name>
- <range><gt>6.0.0</gt><lt>6.0.34</lt></range>
+ <name>tomcat</name>
+ <range><gt>6.0.0</gt><lt>6.0.34</lt></range>
</package>
<package>
- <name>tomcat</name>
- <range><gt>7.0.0</gt><lt>7.0.23</lt></range>
+ <name>tomcat</name>
+ <range><gt>7.0.0</gt><lt>7.0.23</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>The Tomcat security team reports:</p>
- <blockquote cite="http://tomcat.apache.org/security-5.html#Fixed_in_Apache_Tomcat_5.5.35">
- <p>Analysis of the recent hash collision vulnerability identified
- unrelated inefficiencies with Apache Tomcat's handling of large
- numbers of parameters and parameter values. These inefficiencies could
- allow an attacker, via a specially crafted request, to cause large
- amounts of CPU to be used which in turn could create a denial of
- service. The issue was addressed by modifying the Tomcat parameter
- handling code to efficiently process large numbers of parameters and
- parameter values.</p>
- </blockquote>
+ <p>The Tomcat security team reports:</p>
+ <blockquote cite="http://tomcat.apache.org/security-5.html#Fixed_in_Apache_Tomcat_5.5.35">
+ <p>Analysis of the recent hash collision vulnerability identified
+ unrelated inefficiencies with Apache Tomcat's handling of large
+ numbers of parameters and parameter values. These inefficiencies
+ could allow an attacker, via a specially crafted request, to
+ cause large amounts of CPU to be used which in turn could create
+ a denial of service. The issue was addressed by modifying the
+ Tomcat parameter handling code to efficiently process large
+ numbers of parameters and parameter values.</p>
+ </blockquote>
</body>
</description>
<references>