diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 8ccb18029ced..01cc7e709b14 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,111 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> + + ipsec -- Incorrect key usage in AES-XCBC-MAC + + + FreeBSD + 5.45.4_6 + 5.35.3_20 + + + + +

Problem description

+

A programming error in the implementation of the + AES-XCBC-MAC algorithm for authentication resulted in a + constant key being used instead of the key specified by the + system administrator.

+

Impact

+

If the AES-XCBC-MAC algorithm is used for authentication in + the absence of any encryption, then an attacker may be able to + forge packets which appear to originate from a different + system and thereby succeed in establishing an IPsec session. + If access to sensitive information or systems is controlled + based on the identity of the source system, this may result + in information disclosure or privilege escalation.

+ +
+ + CAN-2005-2359 + SA-05:19.ipsec + + + 2005-07-27 + 2005-08-05 + +
+ + + zlib -- buffer overflow vulnerability + + + FreeBSD + 5.45.4_6 + 5.35.4_20 + + + + +

Problem description

+

A fixed-size buffer is used in the decompression of data + streams. Due to erronous analysis performed when zlib was + written, this buffer, which was belived to be sufficiently + large to handle any possible input stream, is in fact too + small.

+

Impact

+

A carefully constructed compressed data stream can result in + zlib overwriting some data structures. This may cause + applications to halt, resulting in a denial of service; or + it may result in an attacker gaining elevated privileges.

+ +
+ + CAN-2005-1849 + SA-05:18.zlib + + + 2005-07-27 + 2005-08-05 + +
+ + + devfs -- ruleset bypass + + + FreeBSD + 5.45.4_5 + 5.35.4_19 + + + + +

Problem description

+

Due to insufficient parameter checking of the node type + during device creation, any user can expose hidden device + nodes on devfs mounted file systems within their jail. + Device nodes will be created in the jail with their normal + default access permissions.

+

Impact

+

Jailed processes can get access to restricted resources on + the host system. For jailed processes running with superuser + privileges this implies access to all devices on the system. + This level of access can lead to information leakage and + privilege escalation.

+ +
+ + CAN-2005-2218 + SA-05:17.devfs + + + 2005-07-20 + 2005-08-05 + +
+ proftpd -- format string vulnerabilities