Security update to mail/ripmime. Version 1.3.2.3 supposedly has fix to "ripMIME attachment extraction bypass". For more information can be found at http://www.freebsd.org/ports/portaudit/85e19dff-e606-11d8-9b0a-000347a4fa7d.html Information I read at above mentioned URL is also the reason why I submitted this PR. Above mentioned URL contains reference to "ports/security/vuxml/vuln.xml". I did not find any reference to "ripMIME attachment extraction bypass" when I searched the "vuln.xml". How-To-Repeat: # portaudit -Fa # cd /usr/ports/mail/ripmime && make all
Dear maintainer, please review the proposed patch. Volker
State Changed From-To: open->feedback Forwarded PR to maintainer
Go ahead! Regards, Justin ----------------------------------------------------------------- | Justin Stanford 4D Digital Security (Pty) Ltd | | Infosec Consultant Tel: +27 21 6879185 | | PGP: www.4dds.co.za/justin-pgp.txt Cell: +27 82 7402741 | ----------------------------------------------------------------- On Fri, 27 Aug 2004, Volker Stolz wrote: > Dear maintainer, please review the proposed patch. > > Volker >
State Changed From-To: feedback->closed Committed, thanks! Indeed, the vulnerability is only in portaudit's db, not VuXML's.