Changeset View
Changeset View
Standalone View
Standalone View
security/vuxml/vuln.xml
- This file is larger than 256 KB, so syntax highlighting is disabled by default.
Show First 20 Lines • Show All 52 Lines • ▼ Show 20 Lines | |||||
Help is also available from ports-security@freebsd.org. | Help is also available from ports-security@freebsd.org. | ||||
Notes: | Notes: | ||||
* Please add new entries to the beginning of this file. | * Please add new entries to the beginning of this file. | ||||
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.) | * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) | ||||
--> | --> | ||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> | <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> | ||||
<vuln vid="a2f35081-8a02-11e8-8fa5-4437e6ad11c4"> | |||||
<topic>mutt -- remote code injection and path traversal vulnerability</topic> | |||||
<affects> | |||||
<package> | |||||
<name>mutt</name> | |||||
<range><lt>1.10.1</lt></range> | |||||
</package> | |||||
</affects> | |||||
<description> | |||||
<body xmlns="http://www.w3.org/1999/xhtml"> | |||||
<p>Kevin J. McCarthy reports:</p> | |||||
<blockquote cite="http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20180716/000004.html"> | |||||
<p>Fixes a remote code injection vulnerability when "subscribing" | |||||
to an IMAP mailbox, either via $imap_check_subscribed, or via the | |||||
<subscribe> function in the browser menu. Mutt was generating a | |||||
"mailboxes" command and sending that along to the muttrc parser. | |||||
However, it was not escaping "`", which executes code and inserts | |||||
the result. This would allow a malicious IMAP server to execute | |||||
arbitrary code (for $imap_check_subscribed).</p> | |||||
<p>Fixes POP body caching path traversal vulnerability.</p> | |||||
<p>Fixes IMAP header caching path traversal vulnerability.</p> | |||||
<p>CVE-2018-14349 - NO Response Heap Overflow</p> | |||||
<p>CVE-2018-14350 - INTERNALDATE Stack Overflow</p> | |||||
<p>CVE-2018-14351 - STATUS Literal Length relative write</p> | |||||
<p>CVE-2018-14352 - imap_quote_string off-by-one stack overflow</p> | |||||
<p>CVE-2018-14353 - imap_quote_string int underflow</p> | |||||
<p>CVE-2018-14354 - imap_subscribe Remote Code Execution</p> | |||||
<p>CVE-2018-14355 - STATUS mailbox header cache directory traversal</p> | |||||
<p>CVE-2018-14356 - POP empty UID NULL deref</p> | |||||
<p>CVE-2018-14357 - LSUB Remote Code Execution</p> | |||||
<p>CVE-2018-14358 - RFC822.SIZE Stack Overflow</p> | |||||
<p>CVE-2018-14359 - base64 decode Stack Overflow</p> | |||||
<p>CVE-2018-14362 - POP Message Cache Directory Traversal</p> | |||||
</blockquote> | |||||
</body> | |||||
</description> | |||||
<references> | |||||
<cvename>CVE-2018-14349</cvename> | |||||
<cvename>CVE-2018-14350</cvename> | |||||
<cvename>CVE-2018-14351</cvename> | |||||
<cvename>CVE-2018-14352</cvename> | |||||
<cvename>CVE-2018-14353</cvename> | |||||
<cvename>CVE-2018-14354</cvename> | |||||
<cvename>CVE-2018-14355</cvename> | |||||
<cvename>CVE-2018-14356</cvename> | |||||
<cvename>CVE-2018-14357</cvename> | |||||
<cvename>CVE-2018-14358</cvename> | |||||
<cvename>CVE-2018-14359</cvename> | |||||
<cvename>CVE-2018-14362</cvename> | |||||
<url>http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20180716/000004.html</url> | |||||
</references> | |||||
<dates> | |||||
<discovery>2018-07-15</discovery> | |||||
<entry>2018-07-17</entry> | |||||
</dates> | |||||
</vuln> | |||||
<vuln vid="20a1881e-8a9e-11e8-bddf-d017c2ca229d"> | <vuln vid="20a1881e-8a9e-11e8-bddf-d017c2ca229d"> | ||||
<topic>jenkins -- multiple vulnerabilities</topic> | <topic>jenkins -- multiple vulnerabilities</topic> | ||||
<affects> | <affects> | ||||
<package> | <package> | ||||
<name>jenkins</name> | <name>jenkins</name> | ||||
<range><lt>2.133</lt></range> | <range><lt>2.133</lt></range> | ||||
</package> | </package> | ||||
<package> | <package> | ||||
▲ Show 20 Lines • Show All 95 Lines • ▼ Show 20 Lines | </blockquote> | ||||
<references> | <references> | ||||
<url>http://httpd.apache.org/security/vulnerabilities_24.html</url> | <url>http://httpd.apache.org/security/vulnerabilities_24.html</url> | ||||
<cvename>CVE-2018-1333</cvename> | <cvename>CVE-2018-1333</cvename> | ||||
<cvename>CVE-2018-8011</cvename> | <cvename>CVE-2018-8011</cvename> | ||||
</references> | </references> | ||||
<dates> | <dates> | ||||
<discovery>2018-07-18</discovery> | <discovery>2018-07-18</discovery> | ||||
<entry>2018-07-18</entry> | <entry>2018-07-18</entry> | ||||
</dates> | |||||
</vuln> | |||||
<vuln vid="a2f35081-8a02-11e8-8fa5-4437e6ad11c4"> | |||||
<topic>mutt -- remote code injection and path traversal vulnerability</topic> | |||||
<affects> | |||||
<package> | |||||
<name>mutt</name> | |||||
<range><lt>1.10.1</lt></range> | |||||
</package> | |||||
</affects> | |||||
<description> | |||||
<body xmlns="http://www.w3.org/1999/xhtml"> | |||||
<p>Kevin J. McCarthy reports:</p> | |||||
<blockquote cite="http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20180716/000004.html"> | |||||
<p>Fixes a remote code injection vulnerability when "subscribing" | |||||
to an IMAP mailbox, either via $imap_check_subscribed, or via the | |||||
<subscribe> function in the browser menu. Mutt was generating a | |||||
"mailboxes" command and sending that along to the muttrc parser. | |||||
However, it was not escaping "`", which executes code and inserts | |||||
the result. This would allow a malicious IMAP server to execute | |||||
arbitrary code (for $imap_check_subscribed).</p> | |||||
<p>Fixes POP body caching path traversal vulnerability.</p> | |||||
<p>Fixes IMAP header caching path traversal vulnerability.</p> | |||||
<p>CVE-2018-14349 - NO Response Heap Overflow</p> | |||||
<p>CVE-2018-14350 - INTERNALDATE Stack Overflow</p> | |||||
<p>CVE-2018-14351 - STATUS Literal Length relative write</p> | |||||
<p>CVE-2018-14352 - imap_quote_string off-by-one stack overflow</p> | |||||
<p>CVE-2018-14353 - imap_quote_string int underflow</p> | |||||
<p>CVE-2018-14354 - imap_subscribe Remote Code Execution</p> | |||||
<p>CVE-2018-14355 - STATUS mailbox header cache directory traversal</p> | |||||
<p>CVE-2018-14356 - POP empty UID NULL deref</p> | |||||
<p>CVE-2018-14357 - LSUB Remote Code Execution</p> | |||||
<p>CVE-2018-14358 - RFC822.SIZE Stack Overflow</p> | |||||
<p>CVE-2018-14359 - base64 decode Stack Overflow</p> | |||||
<p>CVE-2018-14362 - POP Message Cache Directory Traversal</p> | |||||
</blockquote> | |||||
</body> | |||||
</description> | |||||
<references> | |||||
<cvename>CVE-2018-14349</cvename> | |||||
<cvename>CVE-2018-14350</cvename> | |||||
<cvename>CVE-2018-14351</cvename> | |||||
<cvename>CVE-2018-14352</cvename> | |||||
<cvename>CVE-2018-14353</cvename> | |||||
<cvename>CVE-2018-14354</cvename> | |||||
<cvename>CVE-2018-14355</cvename> | |||||
<cvename>CVE-2018-14356</cvename> | |||||
<cvename>CVE-2018-14357</cvename> | |||||
<cvename>CVE-2018-14358</cvename> | |||||
<cvename>CVE-2018-14359</cvename> | |||||
<cvename>CVE-2018-14362</cvename> | |||||
<url>http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20180716/000004.html</url> | |||||
</references> | |||||
<dates> | |||||
<discovery>2018-07-15</discovery> | |||||
<entry>2018-07-17</entry> | |||||
</dates> | </dates> | ||||
</vuln> | </vuln> | ||||
tcberner: ^ I think I see it double :D | |||||
<vuln vid="ef013039-89cd-11e8-84e9-00e04c1ea73d"> | <vuln vid="ef013039-89cd-11e8-84e9-00e04c1ea73d"> | ||||
<topic>typo3 -- multiple vulnerabilities</topic> | <topic>typo3 -- multiple vulnerabilities</topic> | ||||
<affects> | <affects> | ||||
<package> | <package> | ||||
<name>typo3-7</name> | <name>typo3-7</name> | ||||
<range><lt>7.6.30</lt></range> | <range><lt>7.6.30</lt></range> | ||||
</package> | </package> | ||||
<package> | <package> | ||||
▲ Show 20 Lines • Show All 60 Lines • ▼ Show 20 Lines | <p>CVE-2018-1000180: issue around primality tests for RSA key pair | ||||
generation if done using only the low-level API.</p> | generation if done using only the low-level API.</p> | ||||
<p>CVE-2018-1000613: lack of class checking in deserialization | <p>CVE-2018-1000613: lack of class checking in deserialization | ||||
of XMSS/XMSS^MT private keys with BDS state information.</p> | of XMSS/XMSS^MT private keys with BDS state information.</p> | ||||
</blockquote> | </blockquote> | ||||
</body> | </body> | ||||
</description> | </description> | ||||
<references> | <references> | ||||
<cvename>CVE-2018-1000180</cvename> | <cvename>CVE-2018-1000180</cvename> | ||||
<cvename>CVE-2018-1000613</cvename> | <cvename>CVE-2018-1000613</cvename> | ||||
Done Inline Actions^??? tcberner: ^??? | |||||
<url>https://www.bouncycastle.org/latest_releases.html</url> | <url>https://www.bouncycastle.org/latest_releases.html</url> | ||||
</references> | </references> | ||||
<dates> | <dates> | ||||
<discovery>2018-06-30</discovery> | <discovery>2018-06-30</discovery> | ||||
<entry>2018-07-15</entry> | <entry>2018-07-15</entry> | ||||
</dates> | </dates> | ||||
</vuln> | </vuln> | ||||
▲ Show 20 Lines • Show All 32,682 Lines • Show Last 20 Lines |
^ I think I see it double :D