svn commit: r435959 - head/security/vuxml
Raphael Kubo da Costa
rakuco at FreeBSD.org
Sat Mar 11 21:10:00 UTC 2017
Author: rakuco
Date: Sat Mar 11 21:09:58 2017
New Revision: 435959
URL: https://svnweb.freebsd.org/changeset/ports/435959
Log:
Add entry for KTNEF directory traversal issue in deskutils/kdepimlibs4.
There is no CVE assigned at the moment.
More information: https://www.kde.org/info/security/advisory-20170227-1.txt
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Sat Mar 11 20:57:48 2017 (r435958)
+++ head/security/vuxml/vuln.xml Sat Mar 11 21:09:58 2017 (r435959)
@@ -58,6 +58,34 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="e550fc62-069a-11e7-8e3e-5453ed2e2b49">
+ <topic>kdepimlibs -- directory traversal on KTNEF</topic>
+ <affects>
+ <package>
+ <name>kdepimlibs</name>
+ <range><lt>4.14.10_7</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Albert Aastals Cid reports:</p>
+ <blockquote cite="https://www.kde.org/info/security/advisory-20170227-1.txt">
+ <p>A directory traversal issue was found in KTNEF which can be
+ exploited by tricking a user into opening a malicious winmail.dat
+ file. The issue allows to write files with the permission of the user
+ opening the winmail.dat file during extraction.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.kde.org/info/security/advisory-20170227-1.txt</url>
+ </references>
+ <dates>
+ <discovery>2017-02-27</discovery>
+ <entry>2017-03-11</entry>
+ </dates>
+ </vuln>
+
<vuln vid="f714d8ab-028e-11e7-8042-50e549ebab6c">
<topic>kio: Information Leak when accessing https when using a malicious PAC file</topic>
<affects>
More information about the svn-ports-all
mailing list