Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 08 Jun 2014 19:36:50 +0000
From:      bz-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 190802] New: Metasploit Update to 4.9.3 [Addresses CVE-2014-0224]
Message-ID:  <bug-190802-13@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=190802

            Bug ID: 190802
           Summary: Metasploit Update to 4.9.3 [Addresses CVE-2014-0224]
           Product: Ports Tree
           Version: Latest
          Hardware: Any
                OS: Any
            Status: Needs Triage
          Severity: Affects Many People
          Priority: ---
         Component: Individual Port(s)
          Assignee: freebsd-ports-bugs@FreeBSD.org
          Reporter: tanawts@gmail.com

Created attachment 143540
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=143540&action=edit
Patch file to update from 4.9.2 to 4.9.3

This updates Metasploit to 4.9.3.

This addresses CVE-2014-0224 (OpenSSL SSL/TLS MITM vulnerability).  All
components have been recompiled with non-vulnerable versions of OpenSSL,
including:
Nginx - OpenSSL 1.0.1h
Nmap - OpenSSL 1.0.1h
PostgreSQL - OpenSSL 1.0.1h
Ruby - OpenSSL 1.0.1h on Linux, OpenSSL 1.0.0m on Windows
Meterpreter Windows - OpenSSL 0.9.8za

-- 
You are receiving this mail because:
You are the assignee for the bug.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-190802-13>