Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 22 Feb 2019 17:58:16 +0000 (UTC)
From:      Kurt Jaeger <pi@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r493578 - head/security/vuxml
Message-ID:  <201902221758.x1MHwGog019971@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: pi
Date: Fri Feb 22 17:58:16 2019
New Revision: 493578
URL: https://svnweb.freebsd.org/changeset/ports/493578

Log:
  security/vuxml: dokument rdesktop < 1.8.4 vulnerabilities
  
  PR:		235885, 229029

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Fri Feb 22 17:38:57 2019	(r493577)
+++ head/security/vuxml/vuln.xml	Fri Feb 22 17:58:16 2019	(r493578)
@@ -58,6 +58,92 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="3e2c9b63-223c-4575-af5c-816acb14e445">
+    <topic>rdesktop - critical - Remote Code Execution</topic>
+    <affects>
+      <package>
+	<name>rdesktop</name>
+	<range><lt>1.8.4</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<blockquote cite="https://github.com/rdesktop/rdesktop/releases/tag/v1.8.4">;
+	  <ul>
+	    <li>Fix memory corruption in process_bitmap_data - CVE-2018-8794
+	      </li>
+	    <li>Fix remote code execution in process_bitmap_data - CVE-2018-8795
+	      </li>
+	    <li>Fix remote code execution in process_plane - CVE-2018-8797
+	      </li>
+	    <li>Fix Denial of Service in mcs_recv_connect_response - CVE-2018-20175
+	      </li>
+	    <li>Fix Denial of Service in mcs_parse_domain_params - CVE-2018-20175
+	      </li>
+	    <li>Fix Denial of Service in sec_parse_crypt_info - CVE-2018-20176
+	      </li>
+	    <li>Fix Denial of Service in sec_recv - CVE-2018-20176
+	      </li>
+	    <li>Fix minor information leak in rdpdr_process - CVE-2018-8791
+	      </li>
+	    <li>Fix Denial of Service in cssp_read_tsrequest - CVE-2018-8792
+	      </li>
+	    <li>Fix remote code execution in cssp_read_tsrequest - CVE-2018-8793
+	      </li>
+	    <li>Fix Denial of Service in process_bitmap_data - CVE-2018-8796
+	      </li>
+	    <li>Fix minor information leak in rdpsnd_process_ping - CVE-2018-8798
+	      </li>
+	    <li>Fix Denial of Service in process_secondary_order - CVE-2018-8799
+	      </li>
+	    <li>Fix remote code execution in in ui_clip_handle_data - CVE-2018-8800
+	      </li>
+	    <li>Fix major information leak in ui_clip_handle_data - CVE-2018-20174
+	      </li>
+	    <li>Fix memory corruption in rdp_in_unistr - CVE-2018-20177
+	      </li>
+	    <li>Fix Denial of Service in process_demand_active - CVE-2018-20178
+	      </li>
+	    <li>Fix remote code execution in lspci_process - CVE-2018-20179
+	      </li>
+	    <li>Fix remote code execution in rdpsnddbg_process - CVE-2018-20180
+	      </li>
+	    <li>Fix remote code execution in seamless_process - CVE-2018-20181
+	      </li>
+	    <li>Fix remote code execution in seamless_process_line - CVE-2018-20182
+	      </li>
+	  </ul>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://github.com/rdesktop/rdesktop/releases/tag/v1.8.4</url>;
+      <cvename>CVE-2018-20175</cvename>
+      <cvename>CVE-2018-20176</cvename>
+      <cvename>CVE-2018-8791</cvename>
+      <cvename>CVE-2018-8792</cvename>
+      <cvename>CVE-2018-8793</cvename>
+      <cvename>CVE-2018-8794</cvename>
+      <cvename>CVE-2018-8795</cvename>
+      <cvename>CVE-2018-8796</cvename>
+      <cvename>CVE-2018-8797</cvename>
+      <cvename>CVE-2018-8798</cvename>
+      <cvename>CVE-2018-8799</cvename>
+      <cvename>CVE-2018-8800</cvename>
+      <cvename>CVE-2018-20174</cvename>
+      <cvename>CVE-2018-20177</cvename>
+      <cvename>CVE-2018-20178</cvename>
+      <cvename>CVE-2018-20179</cvename>
+      <cvename>CVE-2018-20180</cvename>
+      <cvename>CVE-2018-20181</cvename>
+      <cvename>CVE-2018-20182</cvename>
+    </references>
+    <dates>
+      <discovery>2019-01-02</discovery>
+      <entry>2019-02-22</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="002b4b05-35dd-11e9-94a8-000ffec0b3e1">
     <topic>drupal -- Drupal core - Highly critical - Remote Code Execution</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201902221758.x1MHwGog019971>