summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorFlorian Smeets <flo@FreeBSD.org>2013-12-14 23:30:36 +0000
committerFlorian Smeets <flo@FreeBSD.org>2013-12-14 23:30:36 +0000
commit6fbff9d8da5f697bf20dd4e9a07fb83463ecd15b (patch)
tree0088e44eaba4a78e7277aef4884ca403eacd7fcb /security
parentsysutils/epylog: fix usage of python (diff)
Update to 5.3.28
Security: 47b4e713-6513-11e3-868f-0025905a4771
Diffstat (limited to 'security')
-rw-r--r--security/php53-openssl/Makefile2
-rw-r--r--security/vuxml/vuln.xml47
2 files changed, 47 insertions, 2 deletions
diff --git a/security/php53-openssl/Makefile b/security/php53-openssl/Makefile
index 40154ad54d24..b8a2edc12541 100644
--- a/security/php53-openssl/Makefile
+++ b/security/php53-openssl/Makefile
@@ -1,7 +1,5 @@
# $FreeBSD$
-PORTREVISION= 1
-
CATEGORIES= security
MASTERDIR= ${.CURDIR}/../../lang/php53
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 6e3a33094a7b..f541f0f15c1a 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,53 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="47b4e713-6513-11e3-868f-0025905a4771">
+ <topic>PHP5 -- memory corruption in openssl_x509_parse()</topic>
+ <affects>
+ <package>
+ <name>php5</name>
+ <range><ge>5.4.0</ge><lt>5.4.23</lt></range>
+ </package>
+ <package>
+ <name>php53</name>
+ <range><lt>5.3.28</lt></range>
+ </package>
+ <package>
+ <name>php55</name>
+ <range><ge>5.5.0</ge><lt>5.5.7</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Stefan Esser reports:</p>
+ <blockquote cite="https://www.sektioneins.de/advisories/advisory-012013-php-openssl_x509_parse-memory-corruption-vulnerability.html">
+ <p>The PHP function openssl_x509_parse() uses a helper function
+ called asn1_time_to_time_t() to convert timestamps from ASN1
+ string format into integer timestamp values. The parser within
+ this helper function is not binary safe and can therefore be
+ tricked to write up to five NUL bytes outside of an allocated
+ buffer.</p>
+ <p>This problem can be triggered by x509 certificates that contain
+ NUL bytes in their notBefore and notAfter timestamp fields and
+ leads to a memory corruption that might result in arbitrary
+ code execution.</p>
+ <p>Depending on how openssl_x509_parse() is used within a PHP
+ application the attack requires either a malicious cert signed
+ by a compromised/malicious CA or can be carried out with a
+ self-signed cert.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2013-6420</cvename>
+ <url>https://www.sektioneins.de/advisories/advisory-012013-php-openssl_x509_parse-memory-corruption-vulnerability.html</url>
+ </references>
+ <dates>
+ <discovery>2013-12-13</discovery>
+ <entry>2013-12-14</entry>
+ </dates>
+ </vuln>
+
<vuln vid="dd116b19-64b3-11e3-868f-0025905a4771">
<topic>mozilla -- multiple vulnerabilities</topic>
<affects>