From owner-svn-ports-head@FreeBSD.ORG Tue Jul 23 10:32:23 2013 Return-Path: Delivered-To: svn-ports-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) by hub.freebsd.org (Postfix) with ESMTP id 84C1DADB; Tue, 23 Jul 2013 10:32:23 +0000 (UTC) (envelope-from bdrewery@FreeBSD.org) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 768E625DF; Tue, 23 Jul 2013 10:32:23 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.7/8.14.7) with ESMTP id r6NAWNFf068533; Tue, 23 Jul 2013 10:32:23 GMT (envelope-from bdrewery@svn.freebsd.org) Received: (from bdrewery@localhost) by svn.freebsd.org (8.14.7/8.14.5/Submit) id r6NAWN8o068532; Tue, 23 Jul 2013 10:32:23 GMT (envelope-from bdrewery@svn.freebsd.org) Message-Id: <201307231032.r6NAWN8o068532@svn.freebsd.org> From: Bryan Drewery Date: Tue, 23 Jul 2013 10:32:23 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r323525 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 23 Jul 2013 10:32:23 -0000 Author: bdrewery Date: Tue Jul 23 10:32:22 2013 New Revision: 323525 URL: http://svnweb.freebsd.org/changeset/ports/323525 Log: - Update whitespace for 2fbfd455-f2d0-11e2-8a46-000d601460a4 Requested by: remko Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Jul 23 10:20:02 2013 (r323524) +++ head/security/vuxml/vuln.xml Tue Jul 23 10:32:22 2013 (r323525) @@ -65,14 +65,12 @@ Note: Please add new entries to the beg

When the suPHP_PHPPath was set, mod_suphp would use the specified PHP executable to pretty-print PHP source files (MIME type - x-httpd-php-source or application/x-httpd-php-source). - - However, it would not sanitize the environment. Thus a user that was + x-httpd-php-source or application/x-httpd-php-source).

+

However, it would not sanitize the environment. Thus a user that was allowed to use the SetEnv directive in a .htaccess file (AllowOverride FileInfo) could make PHP load a malicious configuration file (e.g. - loading malicious extensions). - - As the PHP process for highlighting the source file was run with the + loading malicious extensions).

+

As the PHP process for highlighting the source file was run with the privileges of the user Apache HTTPd was running as, a local attacker could probably execute arbitrary code with the privileges of this user.