Bug 185253 - Port Maintainer Update of security/metasploit to 4.8.2
Summary: Port Maintainer Update of security/metasploit to 4.8.2
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: Normal Affects Only Me
Assignee: Antoine Brodin
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-12-28 21:40 UTC by tanawts
Modified: 2013-12-29 09:50 UTC (History)
0 users

See Also:


Attachments
file.diff (947 bytes, patch)
2013-12-28 21:40 UTC, tanawts
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description tanawts 2013-12-28 21:40:00 UTC
Update to Metasploit 4.8.2

Summary
This update includes 8 new modules, including exploits for ColdFusion, Adobe Reader, HP LoadRunner, Windows, and Nvidia Display Driver Service.  It also contains new modules for YouTube and Windows.
 
In addition, this update fixes 2 issues.
 
Exploit modules
Adobe ColdFusion 9 Administrative Login Bypass by Mekanismen and Scott Buckel exploits CVE-2013-0632
Adobe Reader ToolButton Use After Free by sinn3r, juan vazquez, Soroush Dalili, and Unknown exploits ZDI-13-212
Adobe Reader ToolButton Use After Free by sinn3r, juan vazquez, Soroush Dalili, and Unknown exploits ZDI-13-212
HP LoadRunner EmulationAdmin Web Service Directory Traversal by juan vazquez and rgod exploits ZDI-13-259
Microsoft Windows ndproxy.sys Local Privilege Escalation by juan vazquez, Shahin Ramezany, Unkwnon, and ryujin exploits CVE-2013-5065
Nvidia (nvsvc) Display Driver Service Local Privilege Escalation by Ben Campbell and Peter Wintersmith exploits CVE-2013-0109
 
Auxiliary and post modules
Multi Manage Youtube Broadcast by sinn3r
Windows Manage Proxy PAC File by Borja Merino
 
Notable Changes and Resolved Issues
SE Campaign target CSV import should provide useful errors for invalid rows
SE campaign target CSV import fails for Excel CSV files with non-English characters

Fix: Patch attached with submission follows:
Comment 1 Antoine Brodin freebsd_committer freebsd_triage 2013-12-29 09:01:41 UTC
Responsible Changed
From-To: freebsd-ports-bugs->antoine

Take
Comment 2 dfilter service freebsd_committer freebsd_triage 2013-12-29 09:42:46 UTC
Author: antoine
Date: Sun Dec 29 09:42:39 2013
New Revision: 337948
URL: http://svnweb.freebsd.org/changeset/ports/337948

Log:
  Update to 4.8.2
  
  PR:		ports/185253
  Submitted by:	maintainer

Modified:
  head/security/metasploit/Makefile
  head/security/metasploit/distinfo

Modified: head/security/metasploit/Makefile
==============================================================================
--- head/security/metasploit/Makefile	Sun Dec 29 09:06:42 2013	(r337947)
+++ head/security/metasploit/Makefile	Sun Dec 29 09:42:39 2013	(r337948)
@@ -2,7 +2,7 @@
 # $FreeBSD$
 
 PORTNAME=	metasploit
-DISTVERSION=	4.7.2
+DISTVERSION=	4.8.2
 CATEGORIES=	security
 MASTER_SITES=	http://downloads.metasploit.com/data/releases/archive/
 DISTNAME=	framework-${DISTVERSION}

Modified: head/security/metasploit/distinfo
==============================================================================
--- head/security/metasploit/distinfo	Sun Dec 29 09:06:42 2013	(r337947)
+++ head/security/metasploit/distinfo	Sun Dec 29 09:42:39 2013	(r337948)
@@ -1,2 +1,2 @@
-SHA256 (framework-4.7.2.tar.bz2) = bbbb0cc85585fa148d9e7eefeae09b4eeaf061ba457a7490dee450ca7b150f8f
-SIZE (framework-4.7.2.tar.bz2) = 35591358
+SHA256 (framework-4.8.2.tar.bz2) = 7678fce2b22ff824f48244f52fdb27a2a7823d7332f2a75e4c670ccfa5aa6471
+SIZE (framework-4.8.2.tar.bz2) = 35964128
_______________________________________________
svn-ports-all@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/svn-ports-all
To unsubscribe, send any mail to "svn-ports-all-unsubscribe@freebsd.org"
Comment 3 Antoine Brodin freebsd_committer freebsd_triage 2013-12-29 09:42:51 UTC
State Changed
From-To: open->closed

Patch committed, thanks!