Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 30 Jan 2013 18:34:03 +0000 (UTC)
From:      Pawel Pekala <pawel@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r311253 - head/security/vuxml
Message-ID:  <201301301834.r0UIY3AL042642@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: pawel
Date: Wed Jan 30 18:34:02 2013
New Revision: 311253
URL: http://svnweb.freebsd.org/changeset/ports/311253

Log:
  Document devel/upnp vulnerabilities

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Wed Jan 30 18:32:55 2013	(r311252)
+++ head/security/vuxml/vuln.xml	Wed Jan 30 18:34:02 2013	(r311253)
@@ -51,6 +51,54 @@ Note:  Please add new entries to the beg
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="2ea6ce3d-6afd-11e2-9d4e-bcaec524bf84">
+    <topic>upnp -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>upnp</name>
+	<range><lt>1.6.18</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Project changelog reports:</p>
+	<blockquote cite="http://pupnp.sourceforge.net/ChangeLog">;
+	  <p>This patch addresses three possible buffer overflows in
+	    function unique_service_name().The three issues have the
+	    folowing CVE numbers:</p>
+	  <ul>  
+	     <li>CVE-2012-5958 Issue #2: Stack buffer overflow of Tempbuf</li>
+	     <li>CVE-2012-5959 Issue #4: Stack buffer overflow of Event-&gt;UDN</li>
+	     <li>CVE-2012-5960 Issue #8: Stack buffer overflow of Event-&gt;UDN</li>
+	  </ul>  			
+	  <p>Notice that the following issues have already been dealt by
+	    previous work:</p>
+	  <ul>  					
+	     <li>CVE-2012-5961 Issue #1: Stack buffer overflow of Evt-&gt;UDN</li>
+	     <li>CVE-2012-5962 Issue #3: Stack buffer overflow of Evt-&gt;DeviceType</li>
+	     <li>CVE-2012-5963 Issue #5: Stack buffer overflow of Event-&gt;UDN</li>
+	     <li>CVE-2012-5964 Issue #6: Stack buffer overflow of Event-&gt;DeviceType</li>
+	     <li>CVE-2012-5965 Issue #7: Stack buffer overflow of Event-&gt;DeviceType</li>
+	  </ul>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2012-5958</cvename>
+      <cvename>CVE-2012-5959</cvename>
+      <cvename>CVE-2012-5960</cvename>
+      <cvename>CVE-2012-5961</cvename>
+      <cvename>CVE-2012-5962</cvename>
+      <cvename>CVE-2012-5963</cvename>
+      <cvename>CVE-2012-5964</cvename>
+      <cvename>CVE-2012-5965</cvename>
+    </references>
+    <dates>
+      <discovery>2012-11-21</discovery>
+      <entry>2013-01-30</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="559e00b7-6a4d-11e2-b6b0-10bf48230856">
     <topic>wordpress -- multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201301301834.r0UIY3AL042642>