Date: Sun, 08 Jun 2014 19:36:50 +0000 From: bz-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 190802] New: Metasploit Update to 4.9.3 [Addresses CVE-2014-0224] Message-ID: <bug-190802-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=190802 Bug ID: 190802 Summary: Metasploit Update to 4.9.3 [Addresses CVE-2014-0224] Product: Ports Tree Version: Latest Hardware: Any OS: Any Status: Needs Triage Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: freebsd-ports-bugs@FreeBSD.org Reporter: tanawts@gmail.com Created attachment 143540 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=143540&action=edit Patch file to update from 4.9.2 to 4.9.3 This updates Metasploit to 4.9.3. This addresses CVE-2014-0224 (OpenSSL SSL/TLS MITM vulnerability). All components have been recompiled with non-vulnerable versions of OpenSSL, including: Nginx - OpenSSL 1.0.1h Nmap - OpenSSL 1.0.1h PostgreSQL - OpenSSL 1.0.1h Ruby - OpenSSL 1.0.1h on Linux, OpenSSL 1.0.0m on Windows Meterpreter Windows - OpenSSL 0.9.8za -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-190802-13>