Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 17 Oct 2011 16:23:12 +0900 (JST)
From:      Fumiyuki Shimizu <fumifumi@abacustech.jp>
To:        FreeBSD-gnats-submit@FreeBSD.org
Cc:        secteam@FreeBSD.org
Subject:   ports/161734: [vuxml] security/vuxml: PivotX -- Remote File Inclusion Vulnerability of TimThumb
Message-ID:  <20111017072312.11E1E284D0@eyesonly.akkan.be>
Resent-Message-ID: <201110170740.p9H7e8uZ089331@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         161734
>Category:       ports
>Synopsis:       [vuxml] security/vuxml: PivotX -- Remote File Inclusion Vulnerability of TimThumb
>Confidential:   no
>Severity:       serious
>Priority:       high
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Mon Oct 17 07:40:07 UTC 2011
>Closed-Date:
>Last-Modified:
>Originator:     Fumiyuki Shimizu
>Release:        FreeBSD 8.1-RELEASE i386
>Organization:
Abacus Technologies, Inc.
>Environment:
System: FreeBSD 8.1-RELEASE #0: Mon Jul 19 02:55:53 UTC 2010
>Description:
Currentry TimThumb.php remote file inclusion attack is in wild.

Port maintainer (secteam@FreeBSD.org) is cc'd.
Generated with FreeBSD Port Tools 0.99
>How-To-Repeat:
>Fix:

--- vuxml-1.1_1.patch begins here ---
diff -ruN --exclude=CVS /usr/ports/security/vuxml/vuln.xml /usr/home/fumifumi/vuxml/vuln.xml
--- /usr/ports/security/vuxml/vuln.xml	2011-10-17 03:39:44.000000000 +0900
+++ /usr/home/fumifumi/vuxml/vuln.xml	2011-10-17 16:03:06.000000000 +0900
@@ -34,6 +34,40 @@
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="e454ca2f-f88d-11e0-b566-00163e01a509">
+    <topic>PivotX -- Remote File Inclusion Vulnerability of TimThumb</topic>
+    <affects>
+      <package>
+        <name>pivotx</name>
+        <range><lt>2.3.0</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+        <p>The PivotX team reports:</p>
+        <blockquote cite="http://blog.pivotx.net/page/security">;
+          <p>TimThumb domain name security bypass and insecure cache
+          handling. PivotX before 2.3.0 includes a vulnerable version
+          of TimThumb.</p>
+        </blockquote>
+        <blockquote cite="http://blog.pivotx.net/2011-10-14/timthumb-update-for-older-pivotx-installs">;
+          <p>If you are still running PivotX 2.2.6, you might be
+          vulnerable to a security exploit, that was patched
+          previously. Version 2.3.0 doesn't have this issue, but any
+          older version of PivotX might be vulnerable.</p>
+        </blockquote>
+      </body>
+    </description>
+    <references>
+      <bid>45416</bid>
+      <url>https://secunia.com/advisories/45416/</url>;
+    </references>
+    <dates>
+      <discovery>2011-08-03</discovery>
+      <entry>2011-10-17</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="9bad5ab1-f3f6-11e0-8b5c-b482fe3f522d">
     <topic>OpenTTD -- Multiple buffer overflows in validation of external data</topic>
     <affects>
--- vuxml-1.1_1.patch ends here ---

>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20111017072312.11E1E284D0>