Index: head/security/vuxml/vuln.xml =================================================================== --- head/security/vuxml/vuln.xml (revision 459408) +++ head/security/vuxml/vuln.xml (revision 459409) @@ -74925,65535 +74925,65537 @@ in the middle attack.
Note that if the user has set up portaudit to run from periodic this attack could happen without direct user interaction.
In the FreeBSD Ports Collection (bsd.port.mk) the check for vulnerable ports at install-time directly operates on the auditfile and has the same vulnerability as portaudit. As the Ports Collection infrastructure does not have a version number just be sure to have a Ports Collection new enough to contain the fix for portaudit. Note that this is only a problem for users which has portaudit installed, as they will not have the audit database installed or downloaded otherwise.