aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml
diff options
context:
space:
mode:
authorXin LI <delphij@FreeBSD.org>2020-09-07 18:02:55 +0000
committerXin LI <delphij@FreeBSD.org>2020-09-07 18:02:55 +0000
commit3cf2794ffae0b35b36aa4917c44f37e01e7a6ed9 (patch)
treee853f7257c2b330266033df32233f837f0c16007 /security/vuxml
parentdc6360ab93d207e9b46c756c75999662782399b3 (diff)
downloadports-3cf2794ffae0b35b36aa4917c44f37e01e7a6ed9.tar.gz
ports-3cf2794ffae0b35b36aa4917c44f37e01e7a6ed9.zip
Notes
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml37
1 files changed, 37 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index af77addf3973..f7bc9402e1ed 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,43 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="3749ae9e-f132-11ea-97da-d05099c0ae8c">
+ <topic>MPD -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>mpd5</name>
+ <range><lt>5.9</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Chen Nan of Chaitin Security Research Lab reports:</p>
+ <blockquote cite="http://mpd.sourceforge.net/doc5/mpd4.html#4">
+ <p>Fix buffer overflow introduced in version 5.8: processing of
+ template %aX in a RADIUS authentication response might lead
+ to unexpected termination of the mpd5 process.
+ Installations not using RADIUS or not using %aX templates
+ in RADIUS attributes were not affected.</p>
+ <p>Fix buffer overflow in parsing of L2TP control packets
+ introduced in version 4.0 that initially brought in L2TP
+ support: a specially crafted incoming L2TP control packet
+ might lead to unexpected termination of the process.
+ Installations with neither L2TP clients nor L2TP server
+ configured are not affected.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2020-7465</cvename>
+ <cvename>CVE-2020-7466</cvename>
+ <url>http://mpd.sourceforge.net/doc5/mpd4.html#4</url>
+ </references>
+ <dates>
+ <discovery>2020-09-06</discovery>
+ <entry>2020-09-07</entry>
+ </dates>
+ </vuln>
+
<vuln vid="cd97c7ca-f079-11ea-9c31-001b216d295b">
<topic>Multi-link PPP protocol daemon MPD5 remotely exploitable crash</topic>
<affects>