svn commit: r446577 - head/security/vuxml
Steve Wills
swills at FreeBSD.org
Tue Jul 25 12:27:59 UTC 2017
Author: swills
Date: Tue Jul 25 12:27:58 2017
New Revision: 446577
URL: https://svnweb.freebsd.org/changeset/ports/446577
Log:
Document gsoap vulnerability
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Tue Jul 25 12:22:54 2017 (r446576)
+++ head/security/vuxml/vuln.xml Tue Jul 25 12:27:58 2017 (r446577)
@@ -58,6 +58,41 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="8745c67e-7dd1-4165-96e2-fcf9da2dc5b5">
+ <topic>gsoap -- remote code execution via via overflow</topic>
+ <affects>
+ <package>
+ <name>gsoap</name>
+ <range><lt>2.8.47</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Senrio reports:</p>
+ <blockquote cite="http://www.securityfocus.com/bid/99868/discuss">
+ <p>Genivia gSOAP is prone to a stack-based buffer-overflow
+ vulnerability because it fails to properly bounds check user-supplied
+ data before copying it into an insufficiently sized buffer.</p>
+ <p>A remote attacker may exploit this issue to execute arbitrary code
+ in the context of the affected device. Failed attempts will likely
+ cause a denial-of-service condition.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://www.securityfocus.com/bid/99868/discuss</url>
+ <url>http://blog.senr.io/blog/devils-ivy-flaw-in-widely-used-third-party-code-impacts-millions</url>
+ <url>http://blog.senr.io/devilsivy.html</url>
+ <url>https://www.genivia.com/advisory.html#Security_advisory:_CVE-2017-9765_bug_in_certain_versions_of_gSOAP_2.7_up_to_2.8.47_%28June_21,_2017%29</url>
+ <url>https://www.genivia.com/changelog.html#Version_2.8.48_upd_%2806/21/2017%29</url>
+ <cvename>CVE-2017-9765</cvename>
+ </references>
+ <dates>
+ <discovery>2017-07-18</discovery>
+ <entry>2017-07-25</entry>
+ </dates>
+ </vuln>
+
<vuln vid="92f4191a-6d25-11e7-93f7-d43d7e971a1b">
<topic>GitLab -- Various security issues</topic>
<affects>
More information about the svn-ports-all
mailing list