Subject: pkg/22922: sysutils/apcupsd not vulnerable to issue in pkg-vulnerabilities
To: None <gnats-bugs@gnats.netbsd.org>
From: None <tv@duh.org>
List: netbsd-bugs
Date: 09/23/2003 19:18:24
>Number:         22922
>Category:       pkg
>Synopsis:       sysutils/apcupsd not vulnerable to issue in pkg-vulnerabilities
>Confidential:   no
>Severity:       serious
>Priority:       high
>Responsible:    pkg-manager
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Tue Sep 23 23:22:00 UTC 2003
>Closed-Date:
>Last-Modified:
>Originator:     Todd Vierling
>Release:        NetBSD 1.6.1_STABLE
>Organization:
	DUH.ORG:  Pointing out the obvious since 1994.
>Environment:
System: NetBSD server.duh.org 1.6.1_STABLE NetBSD 1.6.1_STABLE (SERVER) #1: Fri Sep 12 11:28:14 EDT 2003 tv@server.duh.org:/export/SRC/duh/netbsd-kernels/SERVER i386
Architecture: i386
Machine: i386
>Description:

The version of apcupsd in sysutils/apcupsd is not vulnerable to the issue
described at:

    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0099

The issue description was modified on 20030823 to clarify that 3.8.6 is NOT
vulnerable to this issue.  So the version numbers in pkg-vulnerability need
to be the same as those for CAN-2003-0098.

>How-To-Repeat:

cd pkgsrc/sysutils/apcupsd && make
[see error about vulnerable package]

>Fix:

--- pkg-vulnerabilities.orig	Tue Sep 23 19:16:42 2003
+++ pkg-vulnerabilities	Tue Sep 23 19:17:55 2003
@@ -335,7 +335,8 @@
 bitchx<1.0.3.19nb1	remote-code-execution	http://www.securityfocus.com/archive/1/315057
 apache-2.0.[0-3][0-9]	denial-of-service	http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0132
 apache-2.0.4[0-4]	denial-of-service	http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0132
-apcupsd<3.10.5		denial-of-service	http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0099
+apcupsd<3.8.6		denial-of-service	http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0099
+apcupsd-3.10.[0-4]	denial-of-service	http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0099
 setiathome<3.08		remote-code-execution	http://spoor12.edup.tudelft.nl/SkyLined%20v4.2/?Advisories/Seti@home
 samba<=2.2.8		remote-root-access	http://lists.samba.org/pipermail/samba-announce/2003-April/000065.html
 mgetty+sendfax<1.1.29	file-permissions	http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1392
>Release-Note:
>Audit-Trail:
>Unformatted: