ports/66150: [PATCH] SECURITY UPDATE ports/www/phpbb for IP spoofing vulnerablity

Xin LI delphij at frontfree.net
Sat May 1 10:57:22 PDT 2004


Also, I hope the attached patch, which mitigates session table exhaustion
which could be used in a DDoS attack after the above patch to get its
way into phpbb/files so it will be automatically patched.

I suggest to add the following item to be added into vuxml:

  <vuln vid=(A newly generated UUID?)>
    <topic>phpBB ession table exhaustion</topic>
    <affects>
      <package>
	<name>phpbb</name>
	<range><le>2.0.8_2</le></range>
      </package>
    </affects>
    <description>
      <body xmlns="http://www.w3.org/1999/xhtml">
	<p>The includes/sessions.php unnecessarily adds session item into
	session table and therefore vulnerable to a DDoS attacK.</p>
	</body>
    </description>
    <references>
	<url>http://www.securityfocus.com/archive/1/360931</url>
      <!--
	<mlist msgid="20040421011055.GA1448 at frontfree.net">
	  http://www.securityfocus.com/archive/1/360931
	</mlist>
      -->
    </references>
    <dates>
      <discovery>2004-03-05</discovery>
      <entry>2004-05-01</entry>
    </dates>
  </vuln>

-- 
Xin LI <delphij frontfree net>	http://www.delphij.net/
See complete headers for GPG key and other information.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
Url : http://lists.freebsd.org/pipermail/freebsd-vuxml/attachments/20040502/e6d82802/attachment.bin


More information about the freebsd-vuxml mailing list