tech-security archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
about vulnerabilities without advisories: how to keep informed
Hi,
I have noted that severals vulnerabilities are corrected in NetBSD release
branchs but without any advisories.
http://www.netbsd.org/support/security/ mention advisories for "serious
security problems", but how keep informed about others security problems ?
Here a list from NetBSD-5-0 branch (taken from src/doc/CHANGES-5.0.3), in order
to flag the problem.
Please notie that all of these are currently without advisories, so are not
"serious security problems" (or perhaps advisory process is engaged... but all
are more 12 day old)
* CVE-2011-0997 [spz, ticket #1595], Thu Apr 7 17:25:47 2011 UTC
dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before
3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute
arbitrary commands via shell metacharacters in a hostname obtained from a DHCP
message.
CVSS v2 Base Score:7.5 (HIGH) [from nvd.nist.gov]
* CVE-2011-0465 [mrg, ticket #1594], Thu Apr 7 06:56:25 2011 UTC
xrdb.c in xrdb before 1.0.9 in X.Org X11R7.6 and earlier allows remote
attackers to execute arbitrary commands via shell metacharacters in a hostname
obtained from a (1) DHCP or (2) XDMCP message
CVSS v2 Base Score:9.3 (HIGH) [from nvd.nist.gov]
* unassigned-CVE [christos, ticket #1593], Tue Apr 5 06:23:12 2011 UTC
"Protect against stack smashes."
so should be have security consideration, according to the description, and
to the fact changes are pull-up in release branch
* unassigned-CVE [spz, ticket #1586], Tue Mar 29 20:13:51 2011 UTC
"Clean up setting ECN bit in TOS. Fixes PR 44742"
PR/44742: "Remotely triggerable ECN panic in tcp_output()"
so is a remote-dos (under particular circonstances ?)
* CVE-2011-0411 [tron, ticket #1578], Thu Mar 24 20:11:25 2011 UTC
The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before
2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict
I/O buffering, which allows man-in-the-middle attackers to insert commands into
encrypted SMTP sessions by sending a cleartext command that is processed after
TLS is in place, related to a "plaintext command injection" attack.
CVSS v2 Base Score:6.8 (MEDIUM) [from nvd.nist.gov]
(not exhaustive list: see
http://cvsweb.netbsd.org/bsdweb.cgi/src/doc/Attic/CHANGES-5.0.3 )
There also security issue known and corrected in current, but not pulled in
release branch:
* CVE-2011-996 [roy 20110406], Wed Apr 6 09:11:08 2011 UTC
import dhcpcd-5.2.12
dhcpcd before 5.2.12 allows remote attackers to execute arbitrary commands
via shell metacharacters in a hostname obtained from a DHCP message
CVSS v2 Base Score:6.8 (MEDIUM) [from nvd.nist.gov]
In conclusion, how to keep informed of current issues of the base system ?
I think something like audit-packages (for pkgsrc), or a website like
security-tracker.debian.org (for debian) ?
Currently, I follow any changes in src/doc/CHANGES-xxx , but as flagged with
dhcpcd, known issues still exist in release branch. I hope pullup process is
engaged, but how to check this ?
Thanks.
--
Frère Sébastien Marie
Abbaye Notre Dame de La Trappe
F-61380 Soligny-la-Trappe
Tél: 02.33.84.17.00
Fax: 02.33.34.98.57
Web: http://www.latrappe.fr/
Home |
Main Index |
Thread Index |
Old Index