View | Details | Raw Unified | Return to bug 200502 | Differences between
and this patch

Collapse All | Expand All

(-)security/vuxml/vuln.xml (+30 lines)
Lines 57-62 Link Here
57
57
58
-->
58
-->
59
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
59
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
  <vuln vid="10a6d0aa-0b1c-11e5-bb90-002590263bf5">
61
    <topic>libzmq4 -- V3 protocol handler vulnerable to downgrade attacks</topic>
62
    <affects>
63
      <package>
64
	<name>libzmq4</name>
65
	<range><ge>4.0.0</ge><lt>4.0.6</lt></range>
66
	<range><ge>4.1.0</ge><lt>4.1.1</lt></range>
67
      </package>
68
    </affects>
69
    <description>
70
      <body xmlns="http://www.w3.org/1999/xhtml">
71
	<p>Pieter Hintjens reports:</p>
72
	<blockquote cite="https://github.com/zeromq/libzmq/issues/1273">
73
	  <p>It is easy to bypass the security mechanism in 4.1.0 and 4.0.5 by
74
	    sending a ZMTP v2 or earlier header. The library accepts such
75
	    connections without applying its security mechanism.</p>
76
	</blockquote>
77
      </body>
78
    </description>
79
    <references>
80
      <cvename>CVE-2014-9721</cvename>
81
      <url>https://github.com/zeromq/libzmq/issues/1273</url>
82
      <mlist>http://www.openwall.com/lists/oss-security/2015/05/07/8</mlist>
83
    </references>
84
    <dates>
85
      <discovery>2014-12-04</discovery>
86
      <entry>2015-06-05</entry>
87
    </dates>
88
  </vuln>
89
60
  <vuln vid="e69af246-0ae2-11e5-90e4-d050996490d0">
90
  <vuln vid="e69af246-0ae2-11e5-90e4-d050996490d0">
61
    <topic>pcre -- multiple vulnerabilities</topic>
91
    <topic>pcre -- multiple vulnerabilities</topic>
62
    <affects>
92
    <affects>

Return to bug 200502