FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-03-27 18:04:16 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
8d5368ef-40fe-11e6-b2ec-b499baebfeafPython -- smtplib StartTLS stripping vulnerability

Red Hat reports:

A vulnerability in smtplib allowing MITM attacker to perform a startTLS stripping attack. smtplib does not seem to raise an exception when the remote end (smtp server) is capable of negotiating starttls but fails to respond with 220 (ok) to an explicit call of SMTP.starttls(). This may allow a malicious MITM to perform a startTLS stripping attack if the client code does not explicitly check the response code for startTLS.


Discovery 2016-06-14
Entry 2016-07-03
python27
< 2.7.12

python33
gt 0

python34
< 3.4.5

python35
< 3.5.2

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-0772
CVE-2016-0772
8e5e6d42-a0fa-11e3-b09a-080027f2d077Python -- buffer overflow in socket.recvfrom_into()

Vincent Danen via Red Hat Issue Tracker reports:

A vulnerability was reported in Python's socket module, due to a boundary error within the sock_recvfrom_into() function, which could be exploited to cause a buffer overflow. This could be used to crash a Python application that uses the socket.recvfrom_info() function or, possibly, execute arbitrary code with the permissions of the user running vulnerable Python code.

This vulnerable function, socket.recvfrom_into(), was introduced in Python 2.5. Earlier versions are not affected by this flaw.


Discovery 2014-01-14
Entry 2014-03-01
python27
le 2.7.6_3

python31
le 3.1.5_10

python32
le 3.2.5_7

python33
le 3.3.3_2

65379
CVE-2014-1912
https://mail.python.org/pipermail/python-dev/2014-February/132758.html
http://bugs.python.org/issue20246
https://bugzilla.redhat.com/show_bug.cgi?id=1062370
a61374fc-3a4d-11e6-a671-60a44ce6887bPython -- HTTP Header Injection in Python urllib

Guido Vranken reports:

HTTP header injection in urrlib2/urllib/httplib/http.client with newlines in header values, where newlines have a semantic consequence of denoting the start of an additional header line.


Discovery 2014-11-24
Entry 2016-06-30
Modified 2016-07-04
python27
< 2.7.10

python33
ge 0

python34
< 3.4.4

python35
< 3.5.0

https://bugs.python.org/issue22928
http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html
http://www.openwall.com/lists/oss-security/2016/06/14/7
CVE-2016-5699
1d0f6852-33d8-11e6-a671-60a44ce6887bPython -- Integer overflow in zipimport module

Python reports:

Possible integer overflow and heap corruption in zipimporter.get_data()


Discovery 2016-01-21
Entry 2016-06-17
python35
< 3.5.1_3

python34
< 3.4.4_3

python33
< 3.3.6_5

python27
< 2.7.11_3

http://bugs.python.org/issue26171
CVE-2016-5636