FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  485185
Date:      2018-11-17
Time:      18:00:17Z
Committer: joneum

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
f8c88d50-5fb3-11e4-81bd-5453ed2e2b49libssh -- PRNG state reuse on forking servers

Aris Adamantiadis reports:

When accepting a new connection, the server forks and the child process handles the request. The RAND_bytes() function of openssl doesn't reset its state after the fork, but simply adds the current process id (getpid) to the PRNG state, which is not guaranteed to be unique.


Discovery 2014-03-05
Entry 2014-10-29
libssh
lt 0.6.3

CVE-2014-0017
http://www.openwall.com/lists/oss-security/2014/03/05/1
http://secunia.com/advisories/57407
6b3591ea-e2d2-11e5-a6be-5453ed2e2b49libssh -- weak Diffie-Hellman secret generation

Andreas Schneider reports:

libssh versions 0.1 and above have a bits/bytes confusion bug and generate an abnormally short ephemeral secret for the diffie-hellman-group1 and diffie-hellman-group14 key exchange methods. The resulting secret is 128 bits long, instead of the recommended sizes of 1024 and 2048 bits respectively. There are practical algorithms (Baby steps/Giant steps, Pollard’s rho) that can solve this problem in O(2^63) operations.

Both client and server are are vulnerable, pre-authentication. This vulnerability could be exploited by an eavesdropper with enough resources to decrypt or intercept SSH sessions. The bug was found during an internal code review by Aris Adamantiadis of the libssh team.


Discovery 2016-02-23
Entry 2016-03-05
libssh
lt 0.7.3

CVE-2016-0739
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-0739
https://www.libssh.org/2016/02/23/libssh-0-7-3-security-and-bugfix-release/
0b040e24-f751-11e4-b24d-5453ed2e2b49libssh -- null pointer dereference

Andreas Schneider reports:

libssh versions 0.5.1 and above have a logical error in the handling of a SSH_MSG_NEWKEYS and SSH_MSG_KEXDH_REPLY package. A detected error did not set the session into the error state correctly and further processed the packet which leads to a null pointer dereference. This is the packet after the initial key exchange and doesn’t require authentication.

This could be used for a Denial of Service (DoS) attack.


Discovery 2015-04-30
Entry 2015-05-10
libssh
lt 0.6.5

CVE-2015-3146
https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release