svn commit: r479532 - head/security/vuxml

Mark Felder feld at FreeBSD.org
Tue Sep 11 16:13:59 UTC 2018


Author: feld
Date: Tue Sep 11 16:13:58 2018
New Revision: 479532
URL: https://svnweb.freebsd.org/changeset/ports/479532

Log:
  Improve formatting
  Also add plexmediaserver-plexpass package as vulnerable

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Tue Sep 11 16:10:30 2018	(r479531)
+++ head/security/vuxml/vuln.xml	Tue Sep 11 16:13:58 2018	(r479532)
@@ -63,6 +63,7 @@ Notes:
     <affects>
       <package>
 	<name>plexmediaserver</name>
+	<name>plexmediaserver-plexpass</name>
 	<range><lt>1.13.5.5332</lt></range>
       </package>
     </affects>
@@ -71,17 +72,17 @@ Notes:
 	<p>Chris reports:</p>
 	<blockquote cite="https://seclists.org/fulldisclosure/2018/Aug/1">
 	  <p>The XML parsing engine for Plex Media Server's SSDP/UPNP
-	    functionality is vulnerable to an XML External Entity 
+	    functionality is vulnerable to an XML External Entity
 	    Processing (XXE) attack. Unauthenticated attackers on the same LAN can
 	    use this vulnerability to:</p>
-	  <li>
-	  <ul>Access arbitrary files from the filesystem with the same permission as
-	  the user account running Plex.</ul>
-	  <ul>Initiate SMB connections to capture NetNTLM challenge/response and
-	  crack to clear-text password.</ul>
-	  <ul>Initiate SMB connections to relay NetNTLM challenge/response and
-	  achieve Remote Command Execution in Windows domains.</ul>
-	  </li>
+	  <ul>
+	  <li>Access arbitrary files from the filesystem with the same permission as
+	  the user account running Plex.</li>
+	  <li>Initiate SMB connections to capture NetNTLM challenge/response and
+	  crack to clear-text password.</li>
+	  <li>Initiate SMB connections to relay NetNTLM challenge/response and
+	  achieve Remote Command Execution in Windows domains.</li>
+	  </ul>
 	</blockquote>
       </body>
     </description>


More information about the svn-ports-head mailing list