svn commit: r446577 - head/security/vuxml

Steve Wills swills at FreeBSD.org
Tue Jul 25 12:27:59 UTC 2017


Author: swills
Date: Tue Jul 25 12:27:58 2017
New Revision: 446577
URL: https://svnweb.freebsd.org/changeset/ports/446577

Log:
  Document gsoap vulnerability

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Tue Jul 25 12:22:54 2017	(r446576)
+++ head/security/vuxml/vuln.xml	Tue Jul 25 12:27:58 2017	(r446577)
@@ -58,6 +58,41 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+  <vuln vid="8745c67e-7dd1-4165-96e2-fcf9da2dc5b5">
+    <topic>gsoap -- remote code execution via via overflow</topic>
+    <affects>
+      <package>
+	<name>gsoap</name>
+	<range><lt>2.8.47</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>Senrio reports:</p>
+	<blockquote cite="http://www.securityfocus.com/bid/99868/discuss">
+	  <p>Genivia gSOAP is prone to a stack-based buffer-overflow
+	  vulnerability because it fails to properly bounds check user-supplied
+	  data before copying it into an insufficiently sized buffer.</p>
+	  <p>A remote attacker may exploit this issue to execute arbitrary code
+	  in the context of the affected device. Failed attempts will likely
+	  cause a denial-of-service condition.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>http://www.securityfocus.com/bid/99868/discuss</url>
+      <url>http://blog.senr.io/blog/devils-ivy-flaw-in-widely-used-third-party-code-impacts-millions</url>
+      <url>http://blog.senr.io/devilsivy.html</url>
+      <url>https://www.genivia.com/advisory.html#Security_advisory:_CVE-2017-9765_bug_in_certain_versions_of_gSOAP_2.7_up_to_2.8.47_%28June_21,_2017%29</url>
+      <url>https://www.genivia.com/changelog.html#Version_2.8.48_upd_%2806/21/2017%29</url>
+      <cvename>CVE-2017-9765</cvename>
+    </references>
+    <dates>
+      <discovery>2017-07-18</discovery>
+      <entry>2017-07-25</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="92f4191a-6d25-11e7-93f7-d43d7e971a1b">
     <topic>GitLab -- Various security issues</topic>
     <affects>


More information about the svn-ports-all mailing list