summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorOlli Hauer <ohauer@FreeBSD.org>2013-07-05 21:06:15 +0000
committerOlli Hauer <ohauer@FreeBSD.org>2013-07-05 21:06:15 +0000
commit89d9998222bcf793d5a3dfd1388176c0b1b5bdeb (patch)
tree9a566b07d131908b7b2bafc92145030fefd0034a
parent- Remove .include <bsd.ports.pre.mk>; bsd.ports.post.mk to bsd.ports.mk; (diff)
- document apache22 CVE-2013-1862 (mod_rewrite)
Update to apache22-2.2.25 is ready to commit. Until now there is no official announcement from apache.org so we hold the update back until we have official checksums.
Notes
Notes: svn path=/head/; revision=322357
-rw-r--r--security/vuxml/vuln.xml45
1 files changed, 45 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index d109da19a03c..5f41cd552ba6 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,51 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="f3d24aee-e5ad-11e2-b183-20cf30e32f6d">
+ <topic>apache22 -- mod_rewrite vulnerability</topic>
+ <affects>
+ <package>
+ <name>apache22</name>
+ <range><gt>2.2.0</gt><lt>2.2.25</lt></range>
+ </package>
+ <package>
+ <name>apache22-event-mpm</name>
+ <range><gt>2.2.0</gt><lt>2.2.25</lt></range>
+ </package>
+ <package>
+ <name>apache22-itk-mpm</name>
+ <range><gt>2.2.0</gt><lt>2.2.25</lt></range>
+ </package>
+ <package>
+ <name>apache22-peruser-mpm</name>
+ <range><gt>2.2.0</gt><lt>2.2.25</lt></range>
+ </package>
+ <package>
+ <name>apache22-worker-mpm</name>
+ <range><gt>2.2.0</gt><lt>2.2.25</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Apache HTTP SERVER PROJECT reports:</h1>
+ <blockquote cite="http://www.apache.org/dist/httpd/CHANGES_2.2.25">
+ <p>The mod_rewrite module in the Apache HTTP Server 2.2.x before
+ 2.2.25 writes data to a log file without sanitizing
+ non-printable characters, which might allow remote attackers to
+ execute arbitrary commands via an HTTP request containing an
+ escape sequence for a terminal emulator.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2013-1862</cvename>
+ </references>
+ <dates>
+ <discovery>2013-06-21</discovery>
+ <entry>2013-07-05</entry>
+ </dates>
+ </vuln>
+
<vuln vid="1b93f6fe-e1c1-11e2-948d-6805ca0b3d42">
<topic>phpMyAdmin -- Global variable scope injection</topic>
<affects>