svn commit: r343150 - head/security/vuxml
Remko Lodder
remko at FreeBSD.org
Fri Feb 7 10:32:04 UTC 2014
On 06 Feb 2014, at 21:39, Carlo Strub <cs at FreeBSD.org> wrote:
> Author: cs
> Date: Thu Feb 6 20:39:30 2014
> New Revision: 343150
> URL: http://svnweb.freebsd.org/changeset/ports/343150
> QAT: https://qat.redports.org/buildarchive/r343150/
>
> Log:
> Update VUXML entry on recent otrs vulnerabilities
>
> Suggested by: remko@
thank you!
>
> Modified:
> head/security/vuxml/vuln.xml
>
> Modified: head/security/vuxml/vuln.xml
> ==============================================================================
> --- head/security/vuxml/vuln.xml Thu Feb 6 20:34:55 2014 (r343149)
> +++ head/security/vuxml/vuln.xml Thu Feb 6 20:39:30 2014 (r343150)
> @@ -249,11 +249,13 @@ Note: Please add new entries to the beg
> </vuln>
>
> <vuln vid="c7b5d72b-886a-11e3-9533-60a44c524f57">
> - <topic>otrs -- SQL injection issue</topic>
> + <topic>otrs -- multiple vulnerabilities</topic>
> <affects>
> <package>
> <name>otrs</name>
> - <range><lt>3.2.14</lt></range>
> + <range><lt>3.1.19</lt></range>
> + <range><gt>3.2.*</gt><lt>3.2.14</lt></range>
> + <range><gt>3.3.*</gt><lt>3.3.4</lt></range>
> </package>
> </affects>
> <description>
> @@ -262,29 +264,6 @@ Note: Please add new entries to the beg
> <blockquote cite="https://www.otrs.com/security-advisory-2014-02-sql-injection-issue/">
> <p>SQL injection issue</p>
> </blockquote>
> - </body>
> - </description>
> - <references>
> - <cvename>CVE-2014-1471</cvename>
> - <url>https://www.otrs.com/security-advisory-2014-02-sql-injection-issue/</url>
> - </references>
> - <dates>
> - <discovery>2014-01-28</discovery>
> - <entry>2014-01-28</entry>
> - </dates>
> - </vuln>
> -
> - <vuln vid="080c5370-886a-11e3-9533-60a44c524f57">
> - <topic>otrs -- CSRF issue in customer web interface</topic>
> - <affects>
> - <package>
> - <name>otrs</name>
> - <range><lt>3.2.14</lt></range>
> - </package>
> - </affects>
> - <description>
> - <body xmlns="http://www.w3.org/1999/xhtml">
> - <p>The OTRS Project reports:</p>
> <blockquote cite="https://www.otrs.com/security-advisory-2014-01-csrf-issue-customer-web-interface/">
> <p>An attacker that managed to take over the session of a logged in customer
> could create tickets and/or send follow-ups to existing tickets due to
> @@ -293,14 +272,21 @@ Note: Please add new entries to the beg
> </body>
> </description>
> <references>
> + <cvename>CVE-2014-1471</cvename>
> + <url>https://www.otrs.com/security-advisory-2014-02-sql-injection-issue/</url>
> <url>https://www.otrs.com/security-advisory-2014-01-csrf-issue-customer-web-interface/</url>
> </references>
> <dates>
> <discovery>2014-01-28</discovery>
> <entry>2014-01-28</entry>
> + <modified>2014-02-06</modified>
> </dates>
> </vuln>
>
> + <vuln vid="080c5370-886a-11e3-9533-60a44c524f57">
> + <cancelled superseded="c7b5d72b-886a-11e3-9533-60a44c524f57"/>
> + </vuln>
> +
> <vuln vid="f9810c43-87a5-11e3-9214-00262d5ed8ee">
> <topic>chromium -- multiple vulnerabilities</topic>
> <affects>
> _______________________________________________
> svn-ports-all at freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/svn-ports-all
> To unsubscribe, send any mail to "svn-ports-all-unsubscribe at freebsd.org"
--
/"\ Best regards, | remko at FreeBSD.org
\ / Remko Lodder | remko at EFnet
X http://www.evilcoder.org/ |
/ \ ASCII Ribbon Campaign | Against HTML Mail and News
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 841 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.freebsd.org/pipermail/svn-ports-head/attachments/20140207/6f226e99/attachment-0001.sig>
More information about the svn-ports-head
mailing list