Re: Heartbleed / r264266 / openssl version

2014-04-11 Thread Eygene Ryabinkin
on top of the vendor source. Another option will be to add an extra command-line flag to 'openssl version', but this will be rather non-standard and FreeBSD-specific. More sane option will be to introduce another line into output of 'openssl version -a' and telling people to analyze

Re: Portaudit build currently broken

2013-04-05 Thread Eygene Ryabinkin
o packaudit: http://codelabs.ru/fbsd/ports/portaudit-db/packaudit-use-subversion.diff Already posted it to secteam@. Wider testing is welcome! PS: yes, the patch misses PORTVERSION bump :( -- Eygene Ryabinkin,,,^..^,,, [ Life's unfair - but root p

Re: FreeBSD Security Advisory FreeBSD-SA-09:15.ssl

2009-12-03 Thread Eygene Ryabinkin
Thu, Dec 03, 2009 at 02:09:36PM +0100, Niels Bakker wrote: > >= > >FreeBSD-SA-09:15.sslSecurity Advisory > > The FreeBSD Proje

Re: LD_PRELOAD temporary patch

2009-12-01 Thread Eygene Ryabinkin
Jille, good day. Tue, Dec 01, 2009 at 05:37:19PM +0100, Jille Timmermans wrote: > Eygene Ryabinkin schreef: > > If you're talking about rtld-elf local root, then the real issue > > is that return values of unsetenv() are not checked and unsetenv() > > could fail, t

Re: LD_PRELOAD temporary patch

2009-12-01 Thread Eygene Ryabinkin
Tue, Dec 01, 2009 at 07:00:16PM +0300, Eygene Ryabinkin wrote: > Sorry, what do you mean by this? Does the attached script print 'VAR = > variable' for you as it does for me on 8.0-BETA2 (and undoubtly, on > 8.0)? If yes then getenv() works properly with a single environment &

Re: LD_PRELOAD temporary patch

2009-12-01 Thread Eygene Ryabinkin
Good evening. Tue, Dec 01, 2009 at 05:09:57PM +0300, Vasim Valejev wrote: > I've used that patch to close the hole. This patch is temporary and > doesn't fix real trouble maker - problem in new version in getenv() If you're talking about rtld-elf local root, then the real issue is that return val

Re: Upcoming FreeBSD Security Advisory

2009-11-30 Thread Eygene Ryabinkin
Colin, *, good day. Tue, Dec 01, 2009 at 01:20:45AM +, FreeBSD Security Officer wrote: > A short time ago a "local root" exploit was posted to the full-disclosure > mailing list; as the name suggests, this allows a local user to execute > arbitrary code as root. > > [...] > > The patch is at >

Re: Openssl TLS Reneg "Bug"

2009-11-19 Thread Eygene Ryabinkin
Tue, Nov 17, 2009 at 12:47:14PM +0100, Daniel wrote: > new here so sorry if I am missing any important points. I was > wondering#: Does anyone know of the status of the "amended" openssl > packages for FreeBSD. I'd like to try running our site with "reneg > off", but I can't seem to find any noti

Re: 2009-07-20 FreeBSD 7.2 (pecoff executable) Local Denial of Service Exploit 23 R D Shaun Colley

2009-11-11 Thread Eygene Ryabinkin
Wed, Nov 11, 2009 at 07:14:48PM +0100, Damian Weber wrote: > FWIW, I got another result on 6.4-STABLE > > FreeBSD mymachine.local 6.4-STABLE FreeBSD 6.4-STABLE #6: Sat Oct 3 13:06:12 > CEST 2009 r...@hypercrypt.local:/usr/obj/usr/src/sys/MYMACHINE i386 > > $ ./pecoff > MZaa

[patch] OpenSSL in base: fix CVE-2009-3555

2009-11-07 Thread Eygene Ryabinkin
>Submitter-Id: current-users >Originator:Eygene Ryabinkin >Organization: Code Labs >Confidential: no >Synopsis: [patch] OpenSSL in base: fix CVE-2009-3555 >Severity: critical >Priority: high >Category: bin >Class: sw-bug >Release:

Re: ports/126853: ports-mgmt/portaudit: speed up audit of installed packages

2009-10-24 Thread Eygene Ryabinkin
Fri, May 01, 2009 at 10:42:21PM +0400, Eygene Ryabinkin wrote: > Gentlemen, good day. > > Just a reminder about this PR -- it is already a bit old. But it is > still viable and kicking on many machines of mine. I am seeing speedups > from 10x to 26x comparing to the plain po

Re: gzip memory corruption

2009-07-30 Thread Eygene Ryabinkin
Xin, Thu, Jul 30, 2009 at 10:43:07PM -0700, Xin LI wrote: > After talking with Matthew Green (the author of NetBSD) it seems that it > would be more reasonable to fix the bug itself than breaking upon > receipt. Here is the patch. You'll probably want to check that (outsize - suffixes[0].ziplen

Re: gzip memory corruption

2009-07-30 Thread Eygene Ryabinkin
Xin, good day. Thu, Jul 30, 2009 at 04:49:53PM -0700, Xin LI wrote: > Having checked with GNU's gzip, it looks like that they arbitrarily set > an upper limit of the suffix length to 30. This is unrelated to the > memcpy bug but let's address it here as well. My revised patch would > make the me

Re: gzip memory corruption

2009-07-08 Thread Eygene Ryabinkin
Xin, good day. Wed, Jul 08, 2009 at 05:05:44PM -0700, Xin LI wrote: > >>> The offending code lays in the function file_compress: > /* Add (usually) .gz to filename */ > if ((size_t)snprintf(outfile, outsize, "%s%s", > file, suffixes

Re: gzip memory corruption

2009-07-08 Thread Eygene Ryabinkin
Wed, Jul 08, 2009 at 10:33:39PM +0300, rrl wrote: > I run Freebsd 7.2 and gzip doesn't handle correctly long suffix name > with the -S option. > > gzip -S `perl -e 'print "A"x1200'` dummy_file > Memory fault (core dumped) > > The offending code lays in the function file_compress: > > /

Re: OpenSSL DoS/PoC in milw0rm

2009-06-05 Thread Eygene Ryabinkin
Oliver, good day. Fri, Jun 05, 2009 at 11:51:27AM +0200, Oliver Pinter wrote: > thanks for the fast reply, and the patch No problems. If you'll be messing with either of patches, please, report on your findings. Thanks! -- Eygene ____ _.--. # \`.|\.....-'` `-._.

Re: OpenSSL DoS/PoC in milw0rm

2009-06-04 Thread Eygene Ryabinkin
Thu, Jun 04, 2009 at 10:15:34PM +0200, Oliver Pinter wrote: > the base system contins 0.9.8e and this PoC is affected up to 0.9.8i There was combined PR for the ports/base system OpenSSL, http://www.freebsd.org/cgi/query-pr.cgi?pr=134653 Probably more complete patch for DTLS stuff, http://sct

FYI: ntpd, CVE-2009-1252, remote code execution with enabled Autokey authentication

2009-05-21 Thread Eygene Ryabinkin
For those who are running Autokey with stock NTPD: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252 http://www.freebsd.org/cgi/query-pr.cgi?pr=134787 For users of net/ntp: http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/134755 http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/13

Re: ports/126853: ports-mgmt/portaudit: speed up audit of installed packages

2009-05-01 Thread Eygene Ryabinkin
Gentlemen, good day. Just a reminder about this PR -- it is already a bit old. But it is still viable and kicking on many machines of mine. I am seeing speedups from 10x to 26x comparing to the plain portaudit. Since VuXML database will only grow, this will be good to consider these patches and

Re: Openssl advisory ?

2009-04-09 Thread Eygene Ryabinkin
Mike, *, good day. Mon, Apr 06, 2009 at 02:44:01PM -0400, Mike Tancsa wrote: > Just wondering if this impacts FreeBSD's version in any significant way ? > > http://www.openssl.org/news/secadv_20090325.txt DoS is probably the likiest item that will be visible: CMS is disabled by-default in upstre

Re: ports/129001: [vuxml] [patch] print/cups-base: fix NULL-pointer dereference

2008-11-28 Thread Eygene Ryabinkin
Dirk, good day. Fri, Nov 28, 2008 at 09:12:47AM +0100, [EMAIL PROTECTED] wrote: > Synopsis: [vuxml] [patch] print/cups-base: fix NULL-pointer dereference > > State-Changed-From-To: feedback->closed > State-Changed-By: dinoex > State-Changed-When: Fri Nov 28 09:11:46 CET 2008 > State-Changed-Why:

Re: ports/128999: [vuxml] [patch] update audio/streamripper to 1.64.0, fix CVE-2008-4829

2008-11-25 Thread Eygene Ryabinkin
Matthew, good day. Tue, Nov 25, 2008 at 11:51:42AM +, Matthew Seaman wrote: > Jason Stone wrote: > > > If people really would like to see these kind of notifications (i.e., > > security-related PRs for ports) in mailing-list format, I think that a > > separate mailing list would be appropriat

Re: PR followups in the freebsd-security list [WAS: ports/129037: [patch] [vuxml] graphics/imlib2: fix CVE-2008-5187]

2008-11-24 Thread Eygene Ryabinkin
William, everyone, good day. Mon, Nov 24, 2008 at 08:05:26PM +0100, William Palfreman wrote: > 2008/11/24 <[EMAIL PROTECTED]>: > > Synopsis: [patch] [vuxml] graphics/imlib2: fix CVE-2008-5187 > > > > State-Changed-From-To: open->closed > > State-Changed-By: stas > > State-Changed-When: Mon Nov 24

[vuxml] editors/vim: document netrw issues

2008-11-24 Thread Eygene Ryabinkin
>Submitter-Id: current-users >Originator:Eygene Ryabinkin >Organization: Code Labs >Confidential: no >Synopsis: [vuxml] editors/vim: document netrw issues >Severity: serious >Priority: medium >Category: ports >Class: sw-bug

Re: ports/129097: [vuxml] print/hplip: document CVE-2008-2940 and CVE-2008-2941

2008-11-23 Thread Eygene Ryabinkin
Anish, good day. Sun, Nov 23, 2008 at 02:46:26PM -0500, Anish Mistry wrote: > On Sunday 23 November 2008, Eygene Ryabinkin wrote: > > >Number: 129097 > > >Category: ports > > >Synopsis: [vuxml] print/hplip: document CVE-2008-2940 and > >

Re: Dropping syn+fin replies, but not really?

2008-11-23 Thread Eygene Ryabinkin
Eirik, good day. Sun, Nov 23, 2008 at 05:03:15PM +0100, Eirik ?verby wrote: > I have a FreeBSD based firewall (pfsense) and, behind it, a few dozen > FreeBSD servers. Now we're required to run external security scans > (nessus++) on some of the hosts, and they constantly come back with a > "

Re: ports/129097: [vuxml] print/hplip: document CVE-2008-2940 and CVE-2008-2941

2008-11-23 Thread Eygene Ryabinkin
the kernel. `-'" `"\_ ,_.-;_.-\_ ', fsc/as # _.-'_./ {_.' ; / #-- FreeBSD Developers handbook {_.-``-' {_/ # From e8f2e991adcde572e1c08951c9b973ca6759455f Mon Sep 17 00:00:00 2001 From: Eygene Ryabinkin <[EMAIL PROTECTE

[vuxml] print/hplip: document CVE-2008-2940 and CVE-2008-2941

2008-11-23 Thread Eygene Ryabinkin
>Submitter-Id: current-users >Originator:Eygene Ryabinkin >Organization: Code Labs >Confidential: no >Synopsis: [vuxml] print/hplip: document CVE-2008-2940 and CVE-2008-2941 >Severity: serious >Priority: high >Category: ports >Cla

[patch] [vuxml] net/wireshark: fix DoS in SMTP dissector

2008-11-22 Thread Eygene Ryabinkin
>Submitter-Id: current-users >Originator:Eygene Ryabinkin >Organization: Code Labs >Confidential: no >Synopsis: [patch] [vuxml] net/wireshark: fix DoS in SMTP dissector >Severity: serious >Priority: high >Category: ports >Class: sw-

[vuxml] graphics/optipng: document CVE-2008-5101

2008-11-22 Thread Eygene Ryabinkin
>Submitter-Id: current-users >Originator:Eygene Ryabinkin >Organization: Code Labs >Confidential: no >Synopsis: [vuxml] graphics/optipng: document CVE-2008-5101 >Severity: serious >Priority: high >Category: ports >Class: sw-bug

Re: ports/129001: [vuxml] [patch] print/cups-base: fix NULL-pointer dereference

2008-11-21 Thread Eygene Ryabinkin
Dirk, good day. Fri, Nov 21, 2008 at 07:46:12PM +0100, [EMAIL PROTECTED] wrote: > Synopsis: [vuxml] [patch] print/cups-base: fix NULL-pointer dereference > > State-Changed-From-To: open->feedback > State-Changed-By: dinoex > State-Changed-When: Fri Nov 21 19:45:23 CET 2008 > State-Changed-Why: >

ports/129050: [vuxml] [patch] audio/libcdaudio: fix CVE-2005-0706 and CVE-2008-5030

2008-11-21 Thread Eygene Ryabinkin
>Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Fri Nov 21 15:20:01 UTC 2008 >Closed-Date: >Last-Modified: >Originator: Eygene Ryabinkin >Release:FreeBSD 7.1-PRERELEASE i386 >Organizat

Re: Plaintext recovery attack in SSH, discovered by CPNI?

2008-11-21 Thread Eygene Ryabinkin
Damien, Fri, Nov 21, 2008 at 04:13:43PM +0300, Eygene Ryabinkin wrote: > Fri, Nov 21, 2008 at 10:10:32PM +1100, Damien Miller wrote: > > see http://www.openssh.com/txt/cbc.adv > > Thanks! Is there some secret place that links to this (and other) > advisory or I sho

Re: Plaintext recovery attack in SSH, discovered by CPNI?

2008-11-21 Thread Eygene Ryabinkin
Damien, good day. Fri, Nov 21, 2008 at 10:10:32PM +1100, Damien Miller wrote: > see http://www.openssh.com/txt/cbc.adv Thanks! Is there some secret place that links to this (and other) advisory or I should just poll http://openssh.org/txt/? ;)) -- Eygene ____ _.--. # \

Re: Plaintext recovery attack in SSH, discovered by CPNI?

2008-11-20 Thread Eygene Ryabinkin
Me again. Wed, Nov 19, 2008 at 04:20:58PM +0300, Eygene Ryabinkin wrote: > Just came across the following list in the oss-security list: > http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt For you interest, CVE was created and it has some interesting links inside (SANS one ex

ports/129037: [patch] [vuxml] graphics/imlib2: fix CVE-2008-5187

2008-11-20 Thread Eygene Ryabinkin
eywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Fri Nov 21 05:50:01 UTC 2008 >Closed-Date: >Last-Modified: >Originator: Eygene Ryabinkin >Release:FreeBSD 7.1-PRERELEASE i386 >Organization: Code Labs >Env

Re: ports/129001: [vuxml] [patch] print/cups-base: fix NULL-pointer dereference

2008-11-20 Thread Eygene Ryabinkin
Me again. Thu, Nov 20, 2008 at 03:36:00AM +0300, Eygene Ryabinkin wrote: > It was discovered [1] that CUPS up to 1.3.9 has code path that will > dereference NULL pointer and it is trivially reproducible when user hits > the subscription limit, for example via repeated command

Re: ports/129000: [vuxml] mail/dovecot: document CVE-2008-4577 and CVE-2008-4578

2008-11-19 Thread Eygene Ryabinkin
Xin, Wed, Nov 19, 2008 at 03:46:07PM -0800, Xin LI wrote: > > Thanks for handling this. But I have a question: what is the general > > policy about versions that are to be documented within the 'range' > > clauses? You had changed version specification to '1.1.4', but it was > > never been in th

ports/129001: [vuxml] [patch] print/cups-base: fix NULL-pointer dereference

2008-11-19 Thread Eygene Ryabinkin
>Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Thu Nov 20 00:40:01 UTC 2008 >Closed-Date: >Last-Modified: >Originator: Eygene Ryabinkin >Release:FreeBSD 7.1-PRERELEASE i386 >Organization: Cod

Re: ports/129000: [vuxml] mail/dovecot: document CVE-2008-4577 and CVE-2008-4578

2008-11-19 Thread Eygene Ryabinkin
Xin, good day. Wed, Nov 19, 2008 at 10:37:12PM +, [EMAIL PROTECTED] wrote: > Synopsis: [vuxml] mail/dovecot: document CVE-2008-4577 and CVE-2008-4578 > > State-Changed-From-To: open->closed > State-Changed-By: delphij > State-Changed-When: Wed Nov 19 22:36:55 UTC 2008 > State-Changed-Why: >

Re: ports/128998: [vuxml] document vulnerabilities in textproc/libxml2

2008-11-19 Thread Eygene Ryabinkin
Wed, Nov 19, 2008 at 11:41:01PM +0300, Eygene Ryabinkin wrote: > The fix for the CVE-2008-4225 and CVE-2008-4226 was commited to the > textproc/libxml2 just an hour ago, but vulnerabilities seem to be left > undocumented. At least I was not able to find the corresponding PR and &g

ports/129000: [vuxml] mail/dovecot: document CVE-2008-4577 and CVE-2008-4578

2008-11-19 Thread Eygene Ryabinkin
>Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Wed Nov 19 22:00:10 UTC 2008 >Closed-Date: >Last-Modified: >Originator: Eygene Ryabinkin >Release:FreeBSD 7.1-PRERELEASE i386 >Organization: Cod

ports/128999: [vuxml] [patch] update audio/streamripper to 1.64.0, fix CVE-2008-4829

2008-11-19 Thread Eygene Ryabinkin
>Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Wed Nov 19 21:30:14 UTC 2008 >Closed-Date: >Last-Modified: >Originator: Eygene Ryabinkin >Release:FreeBSD 7.1-PRERELEASE i386 >Organizat

ports/128998: [vuxml] document vulnerabilities in textproc/libxml2

2008-11-19 Thread Eygene Ryabinkin
eywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Wed Nov 19 20:50:01 UTC 2008 >Closed-Date: >Last-Modified: >Originator: Eygene Ryabinkin >Release:FreeBSD 7.1-PRERELEASE i386 >Organization: Code Labs >Env

Re: Plaintext recovery attack in SSH, discovered by CPNI?

2008-11-19 Thread Eygene Ryabinkin
Wed, Nov 19, 2008 at 04:20:58PM +0300, Eygene Ryabinkin wrote: > Just came across the following list in the oss-security list: Err, wanted to say "link" ;)) -- Eygene ____ _.--. # \`.|\.....-'` `-._.-'_

Plaintext recovery attack in SSH, discovered by CPNI?

2008-11-19 Thread Eygene Ryabinkin
Good day. Just came across the following list in the oss-security list: http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt People are saying that this vulnerability was tested for Debian's ;)) OpenSSH 4.7p1, but they generally believe that any RFC-compliant implementation should have th

Re: ports/128956: [patch] [vuxml] multiple vulnerabilities in PHP 5.2.6

2008-11-19 Thread Eygene Ryabinkin
Steven, Tue, Nov 18, 2008 at 02:50:59PM -0500, Steven M. Christey wrote: > > So, the VuXML entry should be changed accordingly. New content is > > attached. > > Just for my own understanding, did the erroneous CVE description cause any > extra work on your part? No "extra" work. I had just cop

Re: ports/128956: [patch] [vuxml] multiple vulnerabilities in PHP 5.2.6

2008-11-18 Thread Eygene Ryabinkin
Steven, Tue, Nov 18, 2008 at 10:01:20AM -0500, Steven M. Christey wrote: > On Tue, 18 Nov 2008, Eygene Ryabinkin wrote: > It's pretty clear that the description was a typo. It doesn't follow our > typical CVE description style of escalating versions when we list version >

Re: ports/128956: [patch] [vuxml] multiple vulnerabilities in PHP 5.2.6

2008-11-18 Thread Eygene Ryabinkin
Steven, CVE-supporters, good day. Today I was submitted FreeBSD's VuXML entry for CVE-2008-3659 and it seem to be errorneously saying about "PHP 5.6". Could you please try to follow the discuission and say something about the entry's description text? Tue, Nov 18, 2008 at 01:37:13PM +0100, Jille

Re: ports/128956: [patch] [vuxml] multiple vulnerabilities in PHP 5.2.6

2008-11-18 Thread Eygene Ryabinkin
Jille, good day. Tue, Nov 18, 2008 at 01:22:09PM +0100, Jille Timmermans wrote: > I think there is a typo in the vuxml descriptions: > "PHP 4.4.x before 4.4.9 and PHP 5.6 through 5.2.6" > (PHP 5.6 doesn't exist (yet)) Yes: it was written in that way at the CVE entry. I had spotted this, but was

ports/128960: [patch] [vuxml] fix chroot issue in the sysutils/syslog-ng2

2008-11-18 Thread Eygene Ryabinkin
>Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Tue Nov 18 12:00:09 UTC 2008 >Closed-Date: >Last-Modified: >Originator: Eygene Ryabinkin >Release:FreeBSD 7.1-PRERELEASE amd64 >Organization: Code

ports/128958: [vuxml] [patch] fix CVE-2008-3863 in print/enscript-letter

2008-11-18 Thread Eygene Ryabinkin
>Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Tue Nov 18 11:30:01 UTC 2008 >Closed-Date: >Last-Modified: >Originator: Eygene Ryabinkin >Release:FreeBSD 7.1-PRERELEASE amd64 >Organization: Code

ports/128956: [patch] [vuxml] multiple vulnerabilities in PHP 5.2.6

2008-11-18 Thread Eygene Ryabinkin
eywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Tue Nov 18 10:40:00 UTC 2008 >Closed-Date: >Last-Modified: >Originator: Eygene Ryabinkin >Release:FreeBSD 7.1-PRERELEASE amd64 >Organization: Code Labs >Envi

Re: portaudit, vuxml & OVAL data

2008-11-14 Thread Eygene Ryabinkin
Mark, good day. Fri, Nov 14, 2008 at 08:21:05AM -0800, Mark Foster wrote: > I have a project idea regarding the extension of portaudit (which now > solely relies on the vuxml data from security/vuxml) to additionally > parse OVAL (CVE) data from the SCAP project. > http://nvd.nist.gov/scap.cfm > h

ports/128868: [vuxml] security/gnutls: CVE-2008-4989 and update to 2.4.2

2008-11-14 Thread Eygene Ryabinkin
>Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Fri Nov 14 15:00:10 UTC 2008 >Closed-Date: >Last-Modified: >Originator: Eygene Ryabinkin >Release:FreeBSD 8.0-CURRENT amd64 >Organization: Code Labs >E

Re: ports/128837: [vuxml] net-mgmt/net-snmp and net-mgmt/net-snmp53: CVE-2008-4309

2008-11-13 Thread Eygene Ryabinkin
I thought I had added Cc to the freebsd-security, but I hadn't seen the PR in the list. So I am bouncing this message to the freebsd-security. Thu, Nov 13, 2008 at 11:00:11AM +, [EMAIL PROTECTED] wrote: > http://www.freebsd.org/cgi/query-pr.cgi?pr=128837 > > >Category: ports > >Respons

ports/128749: [vuxml] VBA parser vulnerability in ClamAV < 0.94.1

2008-11-10 Thread Eygene Ryabinkin
t;Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Mon Nov 10 11:20:02 UTC 2008 >Closed-Date: >Last-Modified: >Originator: Eygene Ryabinkin >Release:FreeBSD 7.1-PRERELEASE i386 >Organization: Code Labs >

ports/128698: [vuxml] new entry for Dovecot 1.1.4-1.1.5

2008-11-08 Thread Eygene Ryabinkin
>Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Sat Nov 08 14:10:01 UTC 2008 >Closed-Date: >Last-Modified: >Originator: Eygene Ryabinkin >Release:FreeBSD 7.1-PRERELEASE amd64 >Organization: Code Labs >En

Re: Vulnerability with compromised geli credentials?

2008-05-20 Thread Eygene Ryabinkin
Abiron, good day. Sat, May 17, 2008 at 05:41:13PM -0700, Abiron Arroyo wrote: > I'm not really a developer, but was considering if there is a key > vulnerability in geli given that when you change a key there isn't a disk > update. > > Consider the scenario where a new file system is created and

CVE-2008-1483: OpenSSH X11 connection hijacking

2008-04-07 Thread Eygene Ryabinkin
Good day. I just read the security alert from the Globus Alliance and want to pass this information to the FreeBSD security people. Apologies if the issue is already known and is worked on. Since the information was already disclosed into the public, I am CC'ing to the freebsd-security mailing l

Re: *BSD user-ppp local root (when conditions permit)

2008-03-02 Thread Eygene Ryabinkin
Me again. Sun, Mar 02, 2008 at 08:59:53AM +0300, Eygene Ryabinkin wrote: > >> Could you please test the following rough patch > > > > It seems you are going to cut of part of line silently. > > > > IMHO - the line shall be rejected as invalid at all or warning

Re: *BSD user-ppp local root (when conditions permit)

2008-03-01 Thread Eygene Ryabinkin
Me again. Sun, Mar 02, 2008 at 02:06:34AM +0300, Eygene Ryabinkin wrote: > Fri, Feb 29, 2008 at 04:39:03PM -, [EMAIL PROTECTED] wrote: > > I just tested this on FreeBSD 6.3. This bug was discovered on NetBSD. It > > also works on OpenBSD (unconfirmed on 4.2) > > &

Re: *BSD user-ppp local root (when conditions permit)

2008-03-01 Thread Eygene Ryabinkin
Dan, good day. Sun, Mar 02, 2008 at 01:48:17AM +0100, Dan Lukes wrote: > Eygene Ryabinkin napsal/wrote, On 03/02/08 00:06: >>> 1. Run ppp >>> 2. type the following (or atleat some variation of) > ... > >> Yes, good catch: looks like stack-based buffer overflo

Re: *BSD user-ppp local root (when conditions permit)

2008-03-01 Thread Eygene Ryabinkin
Good day. [Reposting this message to the freebsd-security from my subscribed address. Sorry for possible duplicates.] Fri, Feb 29, 2008 at 04:39:03PM -, [EMAIL PROTECTED] wrote: > I just tested this on FreeBSD 6.3. This bug was discovered on NetBSD. It also > works on OpenBSD (unconfirmed on

Re: Zeroing sensitive memory chunks [Was: Security Flaw in Popular Disk Encryption Technologies]

2008-02-24 Thread Eygene Ryabinkin
Good day. I am posting the follow-up to the -hackers and CC'ing to the -security, because some more-or-less nasty points were found. Sat, Feb 23, 2008 at 10:32:02PM +0300, Eygene Ryabinkin wrote: > But there is another concern with bzero(): it is well-known function. > Especially fo

Re: VuXML entry for CVE-2008-0318 (libclamav)

2008-02-15 Thread Eygene Ryabinkin
Remko, good day. Fri, Feb 15, 2008 at 11:24:26AM +0100, Remko Lodder wrote: > I had processed it to VuXML just minutes ago, thanks for your submission! > (no worries about the stripped attachement!) it's greatly appreciated! Thank you very much! -- Eygene

Re: VuXML entry for CVE-2008-0318 (libclamav)

2008-02-14 Thread Eygene Ryabinkin
Good day. Wed, Feb 13, 2008 at 06:38:46PM +0300, Eygene Ryabinkin wrote: > Attached is the draft of the VuXML entry for the new ClamAV > vulnerability. As pointed to me by Remko Lodder, the attachment was stripped. Resending it inline. Remko, thanks again for pointing me to this pit

VuXML entry for CVE-2008-0318 (libclamav)

2008-02-13 Thread Eygene Ryabinkin
Good day. Attached is the draft of the VuXML entry for the new ClamAV vulnerability. >From what I had seen and from the comments of the iDefence and ClamAV changelog, it seems that the vulnerable Petite PE module is really disabled in daily.cfg. The file has entries 'PE:0xbfff:13:23' and 'PE:0xd

Re: MD5 Collisions...

2007-12-04 Thread Eygene Ryabinkin
Josh, good day. Tue, Dec 04, 2007 at 10:10:32AM -0600, Josh Paetzel wrote: > > The usefullness of this with application to the ports collection > > is questionable, since you should make two colliding archives and > > both of them should be unpackable and the second should do some > > evil things.

Re: MD5 Collisions...

2007-12-04 Thread Eygene Ryabinkin
Matt, good day. Tue, Dec 04, 2007 at 09:19:58AM -0500, Matt Piechota wrote: > Norberto Meijome wrote: >> I understand that the final nail in MD5's coffin hasn't been found > > yet ( ie, we cannot "determine the exact original input given a > > hash value") , but the fact that certain magic bytes

Re: FastIPSec and OCF

2007-10-05 Thread Eygene Ryabinkin
Fri, Oct 05, 2007 at 02:10:06PM +0100, Bubble Reading wrote: > Thanks much for your help. You're welcome ;)) > I am using FreeBSD v6.2. > > My aim is to use a hardware crypto card. Yes, but for what purpose? To accelerate IPSec or to do some cryptographic operations? This is somewhat ritorica

Re: FastIPSec and OCF

2007-10-05 Thread Eygene Ryabinkin
Fri, Oct 05, 2007 at 12:26:15PM +0100, Bubble Reading wrote: > Can I use Fast-IPSec as a tool to run a crypto command ? If you mean by 'Fast-IPSec' the implementation of the IPSec made by George Neville-Neil (used to be FAST_IPSEC, but in the 7-CURRENT old KAME stack was thrown away, so now it is

Re: FastIPSec and OCF

2007-10-05 Thread Eygene Ryabinkin
Good day. Fri, Oct 05, 2007 at 10:51:56AM +0100, Bubble Reading wrote: > Does FASTIPSec in FreeBSD use OCF framework ? Where can I find more > documentation ? OCF: man 9 crypto IPSec: man 4 ipsec It will give you some pointers, at least on the 7-CURRENT. You can not say 'OCF Framework', because

Re: OCF

2007-09-21 Thread Eygene Ryabinkin
Fri, Sep 21, 2007 at 11:30:15AM +0200, Mohacsi Janos wrote: > >Can someone please guide where can I find OCF source code in FreeBSD and > >also is there IKE implementation and OpenSWAN ? > > For IKE have a look at: > http://www.freshports.org/security/ipsec-tools/ And http://www.freshports.org/se

Re: Anybody may fix samba and php in frozen ports ?

2007-05-18 Thread Eygene Ryabinkin
Dmitry, good day. Fri, May 18, 2007 at 11:47:53AM +0700, Dmitry A Grigorovich wrote: > subj May be you will find an answer in the thread http://lists.freebsd.org/pipermail/freebsd-ports/2007-May/040668.html especially read http://lists.freebsd.org/pipermail/freebsd-ports/2007-May/040672.html

VuXML entry for CVE-2007-1870: ClamAV CAB File Unstore Buffer Overflow

2007-04-16 Thread Eygene Ryabinkin
Good day. Spotted the CVE-2007-1870: the clamav 0.90.2 is already in the ports, but no sign of the issue in the VuXML. The entry is attached. One thing that is a bit strange is that the ChangeLog for the ClamAV (http://svn.clamav.net/svn/clamav-devel/trunk/ChangeLog) says about CVE-2007-1997 as th

Re: The best way to protect against starvation?

2007-04-06 Thread Eygene Ryabinkin
G?ran, good day. Fri, Apr 06, 2007 at 04:50:08PM +0200, G Hasse wrote: > If an ordinary user runs: > > -- snip -- > cat > starv.c < main(){ char *point; while(1) { point = ( char * ) malloc(1); }} > EOF > cc starv.c > while true > do > ./a.out & > done > -- snip -- > > This will fast starv

Re: Re: Reality check: IPFW sees SSH traffic that sshd does not?

2007-03-22 Thread Eygene Ryabinkin
Good day! Thu, Mar 22, 2007 at 02:04:46PM +0100, Volker wrote: > > You can use the following rule that will put very fast SSH connectors > > to the pf table ssh_scans: > > - > > pass in quick on $iface proto tcp from any to $ip port 22 flags S/AUSPF \ > > keep state (max-src-conn 4, max-src-

Re: Reality check: IPFW sees SSH traffic that sshd does not?

2007-03-21 Thread Eygene Ryabinkin
Wed, Mar 21, 2007 at 10:30:06AM -0400, Bill Moran wrote: > In response to "W. D." <[EMAIL PROTECTED]>: > > > At 08:27 3/21/2007, Bill Moran, wrote: > > I run a little script I wrote that automatically adds > > >failed SSH attempts to a table that blocks them from _everything_ in my > > >pf rules.

Re: OpenBSD IPv6 remote kernel buffer overflow. FreeBSD has this too?

2007-03-17 Thread Eygene Ryabinkin
Colin, > > I really hope that we're not affected, especially since we didn't get > > any advance notice of this; but I've asked several of our IPv6 / network > > stack experts to investigate this. > > After hearing from a KAME developers who investigated this issue, > I'm satisfied that FreeBSD i

Re: OpenBSD IPv6 remote kernel buffer overflow. FreeBSD has this too?

2007-03-15 Thread Eygene Ryabinkin
Robert, good day. > Sorry for the delayed response on this -- I've only just returned from Tokyo > in > the last day and am significantly behind in e-mail from the trip. > > According to a source analysis by Jinmei, we are not vulnerable, but I will > continue tracking the thread. Apparently

Re: OpenBSD IPv6 remote kernel buffer overflow. FreeBSD has this too?

2007-03-14 Thread Eygene Ryabinkin
Colin, good day. > I really hope that we're not affected, especially since we didn't get > any advance notice of this; but I've asked several of our IPv6 / network > stack experts to investigate this. Thank you! -- Eygene ___ freebsd-security@freebsd.o

OpenBSD IPv6 remote kernel buffer overflow. FreeBSD has this too?

2007-03-14 Thread Eygene Ryabinkin
Good day. Just spotted the new advisory from CORE: http://www.securityfocus.com/archive/1/462728/30/0/threaded Not an expert, but FreeBSD's src/sys/kern/uipc_mbuf2.c has the very simular code. Robert, anyone, could you please check? Thank you. -- Eygene _

Re: Recent vulnerabilities in xorg-server

2007-01-16 Thread Eygene Ryabinkin
Thu, Jan 11, 2007 at 10:56:16AM +0300, Eygene Ryabinkin wrote: > Remko, good day! > > > Thanks for the notification! We are kinda busy at the > > moment, so if you could spare a minute and write a > > VuXML entry (a draft would also suffice), we ca

Re: Recent vulnerabilities in xorg-server

2007-01-10 Thread Eygene Ryabinkin
Remko, good day! > Thanks for the notification! We are kinda busy at the > moment, so if you could spare a minute and write a > VuXML entry (a draft would also suffice), we can > more easily add it. If you are unable to do so, no > probs, but it is

Recent vulnerabilities in xorg-server

2007-01-10 Thread Eygene Ryabinkin
Colin, good day! Spotted two patches for x11-servers/xorg-server port: see entries for x11r6.9.0-dbe-render.diff and x11r6.9.0-cidfonts.diff at http://xorg.freedesktop.org/releases/X11R6.9.0/patches/index.html Seems like they are not applied to the xorg-server-6.9.0_5. May be it should be added to