From owner-freebsd-ports-bugs@FreeBSD.ORG Wed Dec 29 19:00:28 2010 Return-Path: Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id C48BA10656A3 for ; Wed, 29 Dec 2010 19:00:28 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id 8745E8FC28 for ; Wed, 29 Dec 2010 19:00:28 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.4/8.14.4) with ESMTP id oBTJ0SUn077792 for ; Wed, 29 Dec 2010 19:00:28 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.4/8.14.4/Submit) id oBTJ0ShF077768; Wed, 29 Dec 2010 19:00:28 GMT (envelope-from gnats) Resent-Date: Wed, 29 Dec 2010 19:00:28 GMT Resent-Message-Id: <201012291900.oBTJ0ShF077768@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Mark Foster Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 5886C106566B for ; Wed, 29 Dec 2010 18:56:56 +0000 (UTC) (envelope-from nobody@FreeBSD.org) Received: from red.freebsd.org (unknown [IPv6:2001:4f8:fff6::22]) by mx1.freebsd.org (Postfix) with ESMTP id 487318FC0C for ; Wed, 29 Dec 2010 18:56:56 +0000 (UTC) Received: from red.freebsd.org (localhost [127.0.0.1]) by red.freebsd.org (8.14.4/8.14.4) with ESMTP id oBTIuuAw023887 for ; Wed, 29 Dec 2010 18:56:56 GMT (envelope-from nobody@red.freebsd.org) Received: (from nobody@localhost) by red.freebsd.org (8.14.4/8.14.4/Submit) id oBTIuurc023886; Wed, 29 Dec 2010 18:56:56 GMT (envelope-from nobody) Message-Id: <201012291856.oBTIuurc023886@red.freebsd.org> Date: Wed, 29 Dec 2010 18:56:56 GMT From: Mark Foster To: freebsd-gnats-submit@FreeBSD.org X-Send-Pr-Version: www-3.1 Cc: Subject: ports/153526: vuxml entry for wordpress CVE-2010-4257 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 29 Dec 2010 19:00:28 -0000 >Number: 153526 >Category: ports >Synopsis: vuxml entry for wordpress CVE-2010-4257 >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: update >Submitter-Id: current-users >Arrival-Date: Wed Dec 29 19:00:28 UTC 2010 >Closed-Date: >Last-Modified: >Originator: Mark Foster >Release: 8.0-RELEASE >Organization: BitPusher >Environment: n/a >Description: wordpress -- wordpress 3.0.2

Vendor reports:

SQL injection vulnerability in the do_trackbacks function in wp-includes/comment.php in WordPress before 3.0.2 allows remote authenticated users to execute arbitrary SQL commands via the Send Trackbacks field.

CVE-2010-4257 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4257 2010-11-16 2010-12-29
>How-To-Repeat: n/a >Fix: n/a >Release-Note: >Audit-Trail: >Unformatted: