Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 15 Jul 2015 15:50:00 +0000 (UTC)
From:      Mark Felder <feld@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r392159 - head/security/vuxml
Message-ID:  <201507151550.t6FFo05A030172@svnmir.geo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: feld
Date: Wed Jul 15 15:49:59 2015
New Revision: 392159
URL: https://svnweb.freebsd.org/changeset/ports/392159

Log:
  - Document multiple security issues for libwmf
  
  PR:		201513
  Security:	CVE-2004-0941
  Security:	CVE-2007-0455
  Security:	CVE-2007-2756
  Security:	CVE-2007-3472
  Security:	CVE-2007-3473
  Security:	CVE-2007-3477
  Security:	CVE-2009-3546
  Security:	CVE-2015-4695
  Security:	CVE-2015-4696
  Security:	CVE-2015-0848
  Security:	CVE-2015-4588
  Security:	ca139c7f-2a8c-11e5-a4a5-002590263bf5

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Wed Jul 15 15:38:18 2015	(r392158)
+++ head/security/vuxml/vuln.xml	Wed Jul 15 15:49:59 2015	(r392159)
@@ -58,6 +58,109 @@ Notes:
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="ca139c7f-2a8c-11e5-a4a5-002590263bf5">
+    <topic>libwmf -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>libwmf</name>
+	<range><lt>0.2.8.4_14</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Mitre reports:</p>
+	<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0941">;
+	  <p>Multiple buffer overflows in the gd graphics library (libgd) 2.0.21
+	    and earlier may allow remote attackers to execute arbitrary code via
+	    malformed image files that trigger the overflows due to improper
+	    calls to the gdMalloc function, a different set of vulnerabilities
+	    than CVE-2004-0990.</p>
+	</blockquote>
+	<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455">;
+	  <p>Buffer overflow in the gdImageStringFTEx function in gdft.c in GD
+	    Graphics Library 2.0.33 and earlier allows remote attackers to cause
+	    a denial of service (application crash) and possibly execute
+	    arbitrary code via a crafted string with a JIS encoded font.</p>
+	</blockquote>
+	<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756">;
+	  <p>The gdPngReadData function in libgd 2.0.34 allows user-assisted
+	    attackers to cause a denial of service (CPU consumption) via a
+	    crafted PNG image with truncated data, which causes an infinite loop
+	    in the png_read_info function in libpng.</p>
+	</blockquote>
+	<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472">;
+	  <p>Integer overflow in gdImageCreateTrueColor function in the GD
+	    Graphics Library (libgd) before 2.0.35 allows user-assisted remote
+	    attackers to have unspecified attack vectors and impact.</p>
+	</blockquote>
+	<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3473">;
+	  <p>The gdImageCreateXbm function in the GD Graphics Library (libgd)
+	    before 2.0.35 allows user-assisted remote attackers to cause a
+	    denial of service (crash) via unspecified vectors involving a
+	    gdImageCreate failure.</p>
+	</blockquote>
+	<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477">;
+	  <p>The (a) imagearc and (b) imagefilledarc functions in GD Graphics
+	    Library (libgd) before 2.0.35 allow attackers to cause a denial of
+	    service (CPU consumption) via a large (1) start or (2) end angle
+	    degree value.</p>
+	</blockquote>
+	<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546">;
+	  <p>The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.x before
+	    5.3.1, and the GD Graphics Library 2.x, does not properly verify a
+	    certain colorsTotal structure member, which might allow remote
+	    attackers to conduct buffer overflow or buffer over-read attacks via
+	    a crafted GD file, a different vulnerability than CVE-2009-3293.
+	    NOTE: some of these details are obtained from third party
+	    information.</p>
+	</blockquote>
+	<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848">;
+	  <p>Heap-based buffer overflow in libwmf 0.2.8.4 allows remote
+	    attackers to cause a denial of service (crash) or possibly execute
+	    arbitrary code via a crafted BMP image.</p>
+	</blockquote>
+	<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695">;
+	  <p>meta.h in libwmf 0.2.8.4 allows remote attackers to cause a denial
+	    of service (out-of-bounds read) via a crafted WMF file.</p>
+	</blockquote>
+	<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696">;
+	  <p>Use-after-free vulnerability in libwmf 0.2.8.4 allows remote
+	    attackers to cause a denial of service (crash) via a crafted WMF
+	    file to the (1) wmf2gd or (2) wmf2eps command.</p>
+	</blockquote>
+	<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588">;
+	  <p>Heap-based buffer overflow in the DecodeImage function in libwmf
+	    0.2.8.4 allows remote attackers to cause a denial of service (crash)
+	    or possibly execute arbitrary code via a crafted "run-length count"
+	    in an image in a WMF file.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <bid>11663</bid>
+      <bid>22289</bid>
+      <bid>24089</bid>
+      <bid>24651</bid>
+      <bid>36712</bid>
+      <freebsdpr>ports/201513</freebsdpr>
+      <cvename>CVE-2004-0941</cvename>
+      <cvename>CVE-2007-0455</cvename>
+      <cvename>CVE-2007-2756</cvename>
+      <cvename>CVE-2007-3472</cvename>
+      <cvename>CVE-2007-3473</cvename>
+      <cvename>CVE-2007-3477</cvename>
+      <cvename>CVE-2009-3546</cvename>
+      <cvename>CVE-2015-0848</cvename>
+      <cvename>CVE-2015-4695</cvename>
+      <cvename>CVE-2015-4696</cvename>
+      <cvename>CVE-2015-4588</cvename>
+    </references>
+    <dates>
+      <discovery>2004-10-12</discovery>
+      <entry>2015-07-15</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="a12494c1-2af4-11e5-86ff-14dae9d210b8">
     <topic>apache24 -- multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201507151550.t6FFo05A030172>