aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorRaphael Kubo da Costa <rakuco@FreeBSD.org>2016-07-15 11:23:23 +0000
committerRaphael Kubo da Costa <rakuco@FreeBSD.org>2016-07-15 11:23:23 +0000
commit391c843c6c5231bafe3bb141737be260b7c61d12 (patch)
treebf97812c09988af1a3aca5bfff876cfd32701861 /security
parent5f176978ec975a7da4002988c42044c6d096dd87 (diff)
downloadports-391c843c6c5231bafe3bb141737be260b7c61d12.tar.gz
ports-391c843c6c5231bafe3bb141737be260b7c61d12.zip
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml64
1 files changed, 64 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 366ed58b5964..f61e445e00a2 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,70 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="d706a3a3-4a7c-11e6-97f7-5453ed2e2b49">
+ <topic>p7zip -- out-of-bounds read vulnerability</topic>
+ <affects>
+ <package>
+ <name>p7zip</name>
+ <range><lt>15.14_1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Cisco Talos reports:</p>
+ <blockquote cite="http://www.talosintelligence.com/reports/TALOS-2016-0094/">
+ <p>An out-of-bounds read vulnerability exists in the way 7-Zip
+ handles Universal Disk Format (UDF) files.</p>
+ <p>Central to 7-Zip’s processing of UDF files is the
+ CInArchive::ReadFileItem method. Because volumes can have more than
+ one partition map, their objects are kept in an object vector. To
+ start looking for an item, this method tries to reference the proper
+ object using the partition map’s object vector and the "PartitionRef"
+ field from the Long Allocation Descriptor. Lack of checking whether
+ the "PartitionRef" field is bigger than the available amount of
+ partition map objects causes a read out-of-bounds and can lead, in
+ some circumstances, to arbitrary code execution.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2016-2335</cvename>
+ <url>http://blog.talosintel.com/2016/05/multiple-7-zip-vulnerabilities.html</url>
+ </references>
+ <dates>
+ <discovery>2016-05-11</discovery>
+ <entry>2016-07-15</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="a9bcaf57-4a7b-11e6-97f7-5453ed2e2b49">
+ <topic>p7zip -- heap overflow vulnerability</topic>
+ <affects>
+ <package>
+ <name>p7zip</name>
+ <range><lt>15.14_1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Cisco Talos reports:</p>
+ <blockquote cite="http://www.talosintelligence.com/reports/TALOS-2016-0093/">
+ <p>An exploitable heap overflow vulnerability exists in the
+ NArchive::NHfs::CHandler::ExtractZlibFile method functionality of
+ 7zip that can lead to arbitrary code execution.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2016-2334</cvename>
+ <url>http://blog.talosintel.com/2016/05/multiple-7-zip-vulnerabilities.html</url>
+ </references>
+ <dates>
+ <discovery>2016-05-11</discovery>
+ <entry>2016-07-15</entry>
+ </dates>
+ </vuln>
+
<vuln vid="4729c849-4897-11e6-b704-000c292e4fd8">
<topic>samba -- client side SMB2/3 required signing can be downgraded</topic>
<affects>