vulnerabilities listed in portaudit, and those
that depend on them - part 1
math/mupad
Relies on xpm, vulnerable since 2004-09-15
net-p2p/torrentflux
Vulnerable since 2006-10-07
net/tptest
Vulnerable since 2009-12-17
security/pgp6
Vulnerable since 2005-07-31
www/p5-RTx-RightsMatrix
Only works with www/rt36, which is FORBIDDEN
www/p5-RTx-Shredder
Only works with www/rt36, which is FORBIDDEN
www/p5-RTx-Statistics
Only works with www/rt36, which is FORBIDDEN
www/plone
Vulnerable since 2011-02-10
www/pyblosxom
Vulnerable since 2009-02-11
www/rt36
Vulnerable since 2009-12-09
www/zope-archetypes
Depends on www/plone, which is FORBIDDEN
www/zope-calendaring
Depends on www/plone, which is FORBIDDEN
www/zope-coreblog2
Depends on www/plone, which is FORBIDDEN
www/zope-i18nlayer
Depends on www/plone, which is FORBIDDEN
www/zope-plonelanguagetool
Depends on www/plone, which is FORBIDDEN
www/zope-simpleblog
Depends on www/plone, which is FORBIDDEN
- No need to bump PORTREVISION
PR: ports/161039
Submitted by: Ruslan Mahmatkhanov <cvs-src@yandex.ru> (maintainer)
Reported by: Jason Hellenthal <jhell@DataIX.net>
2 weeks according to portaudit (ranging from 23 days to 7 years).
The maintainers were notified by mail that this action would be taken
on 2011-09-03. (Ports for which maintainers responded have been/will be
dealt with separately.)
Also mark DEPRECATED ports that rely on the FORBIDDEN ports, and a few
ports that rely on those DEPRECATED ports.
Here is the (partial) CHANGELOG since 5.59BETA1:
Nmap 5.61TEST1 [2011-09-19]
o The changelog entries below for this test release are not yet
finished or comprehensive. We'll update them soon.
o [Ncat] Updated ca-bundle.crt (primarily to remove DigiNotar).
o Fixed compilation on OS X 10.7 Lion. Thanks to Patrik Karlsson and
Babak Farroki for researching fixes.
o [NSE] Fixed SSL compressor names in ssl-enum-ciphers.nse, and
removed redundant multiple listings of the NULL compressor.
[Matt Selsky]
o [NSE] Added cipher strength ratings to ssl-enum-ciphers.nse.
[Gabriel Lawrence]
o Added Common Platform Enumeration (CPE, http://cpe.mitre.org/)
output for OS and service versions. These show up in normal output
with the headings "OS CPE:" and "Service Info:":
OS CPE: cpe:/o:linux:kernel:2.6.39
Service Info: OS: Linux; CPE: cpe:/o:linux:kernel
These also appear in XML output, which additionally has CPE entries
for service versions. [David, Henri]
o [NSE] Added new default credential list for Oracle and modified the
oracle-brute script to make use of it. [Patrik]
o [NSE] Added xmpp-info.nse as a replacement for xmpp.nse. This updated version
brings new features and fixes. [Vasiliy Kulikov]
o Fixed RPC scan for 64-bit architectures by using fixed-size data
types. [David]
o Relaxed the XML DTD to allow validation of files where the verbosity
level changed during the scan. [Daniel Miller]
o Made a service confidence of 8 (used when tcpwrapped) and indeed any
number between 0 and 10 be legal in XML output according to the DTD.
[Daniel Miller]
o [NSE] Added three scripts that do host discovery on local IPv6
subnets. Each of them uses a different multicast technique, meaning
that even very large networks have host discovery done without
needing to probe every address individually.
+ targets-multicast-ipv6-echo: Sends a multicast echo request, like
broadcast-ping does for IPv4.
+ targets-multicast-ipv6-invalid-dst: Sends an invalid packet that
can elicit an ICMPv6 Parameter Problem response.
+ targets-multicast-ipv6-slaac: Sends a phony router advertisement,
which causes hosts to allocate a temporary address and then send a
packet to discover if anyone else is using the address.
[Weilin, David]
o [NSE] Added functions to packet.lua to make it easier to build IPv6
packets. [Weilin]
o [NSE] Added new script http-vuln-cve2011-3192 which checks whether an instance
of Apache is vulnerable to a DoS attack exploiting the byterange filter.
[Duarte Silva].
o [NSE] Fixed authentication problems in the TNS library that would prevent
authentication from working against Oracle 11.2.0.2.0 XE [Chris Woodbury]
o Removed some restrictions on probe matching that, for example,
prevented a RST/ACK reply from being recognized in a NULL scan. This
was found and fixed by Matthew Stickney and Joe McEachern.
o Rearranged some characters classes in service matches to avoid any
that look like POSIX collating symbols ("[.xyz.]"). John Hutchison
discovered this error caused by one of the match lines:
InitMatch: illegal regexp: POSIX collating elements are not supported
[Daniel Miller]
o [NSE] Added the address-info.nse script, which shows extra information about IP addresses.
o [NSE] Added scripts http-joomla-brute, http-wordpress-brute, http-wp-enum and
http-awstatstotal-exec. [Paulino]
o [Zenmap] Fixed zenmap deleting ports based on newer scans which did
not actually scan the port in question. Additionally ncat now only
updates ports with new information if the new information is the same
protocol. Not just the same port. [Colin Rice]
o [Ncat] Fixed ncat crashing with --ssl-verify -vvv on windows. [Colin Rice]
o [NSE] Added script http-waf-detect. This script tries to determine
if an IDS/IPS/WAF is protecting a web server. [Paulino]
o [NSE] Added the bittorrent library and bittorrent-discovery script which
enables us to discover peers and nodes for a particular torrent file or
magnet link.
o [NSE] Added basic query support to the Oracle TNS library making it possible
for scripts to query the database server using SQL. [Patrik]
o [Ncat] Added --append-output option, that when used along with -o and/or -x
prevents clobbering(truncating) an existing file. [Shinnok]
o [NSE] Added script broadcast-listener that attempts to discover hosts by
passively listening to the network. It does so by decoding ethernet and IP
broadcast and multicast messages. [Patrik]
o Fixed a bug that would make Nmap segfault if it failed to open an interface
using pcap. The bug details and patch are posted here:
http://seclists.org/nmap-dev/2011/q3/365 [Patrik]
o Ncat SCTP mode supports connection brokering now(--sctp --broker). [Shinnok]
o Nmap now defers options parsing until it has read through all the command line
arguments. You can now use options like -S with an IPv6 address before
specifying -6 at the command line, which previously got you an error.
[Shinnok]
o [NSE] Added the library xmpp.lua and the script xmpp-brute that performs
brute force password auditing against XMPP (Jabber) servers. [Patrik]
o [NSE] Fixed a bug in the ssh2-enum-algos script that would prevent it from
displaying any output unless run in debug mode. [Patrik]
o [NSE] Fixed the nsedebug print_hex() function so it does not print an
empty line if there are no remaining characters, and improved its NSEDoc.
[Chris Woodbury].
o [NSE] Added the scripts http-axis2-dir-traversal and
http-litespeed-sourcecode-download that exploits a directory traversal and
null byte poisoning vulnerabilities in Apache Axis2 and LiteSpeed Web Server
respectively. [Paulino]
o [Ncat] Ncat now no longer blocks while an ssl handshake is taking place or
waiting to complete. [Shinnok]
o [NSE] Added the script broadcast-dhcp-discover that sends a DHCP discover
message to the broadcast address and collects and reports the network
information received from the DHCP server. [Patrik]
o [NSE] Added the script smtp-brute that performs brute force password
auditing against SMTP servers. [Patrik]
o [NSE] Updated SMTP library to support authentication using both plain-text
and the SASL library. [Patrik]
o [NSE] Added the script imap-brute that performs brute force password
auditing against IMAP servers. [Patrik]
o [NSE] Updated IMAP library to support authentication using both plain-text
and the SASL library. [Patrik]
o [NSE] Added SASL library created by Djalal Harouni and Patrik Karlsson
providing common code for "Simple Authentication and Security Layer" to
services supporting it. The algorithms supported by the library are:
PLAIN, CRAM-MD5, DIGEST-MD5 and NTLM. [Patrik Karlsson, Djalal Harouni]
o [NSE] Added scripts cvs-brute.nse, cvs-brute-repository.nse and the cvs
library. The cvs-brute-repository script allows for guessing possible
repository names needed in order to perform password guessing using the
cvs-brute.nse script. [Patrik]
o [Zenmap] The Zenmap crash handler now instructs you to mail in crash
information to nmap-dev. [Colin Rice]
o Added IPv6 Neighbor Discovery ping. This is the IPv6 analog to IPv4
ARP scan. It is the default ping type for local IPv6 networks.
[Weilin]
o [NSE] Added smtp-vuln-cve2011-1764 script, which checks if the Exim
SMTP server is vulnerable to the DKIM Format String vulnerability
(CVE-2011-1764). [Djalal]
o Added the broadcast-ping script which sends icmp packets to broadcast
addresses on the selected network interface, or all ethernet interfaces if
none is selected. It has the option to add the discovered hosts as targets.
o [NSE] Applied patch from Chris Woodbury that adds the following additional
information to the output of smb-os-discovery:
+ Forest name
+ FQDN
+ NetBIOS computer name
+ NetBIOS domain name
o [Ncat] Ncat now supports IPV6 addresses by default without the -6 flag.
Additionally ncat listens on both :: and localhost when passed
-l, or any other listening mode unless a specific listening address is
supplied.
o [NSE] Split script db2-discover into two scripts, adding a new
broadcast-db2-discover script. This script attempts to discover DB2
database servers through broadcast requests. [Patrik Karlsson]
o Fixed broken XML output in the case of timed-out hosts; the
enclosing host element was missing. The fix was suggested by Rémi
Mollon.
o [NSE] Added ftp-vuln-cve2010-4221 script, which checks if the ProFTPD
server is vulnerable to the Telnet IAC stack overflow vulnerability
(CVE-2010-4221). [Djalal]
o [NSE] Added ftp-vsftpd-backdoor, which detects a backdoor that was introduced
into vsftpd-2.3.4 source code distributions. [Daniel Miller]
o [NSE] ldap-brute.nse - Multiple changes:
+ Added support for 2008 R2 functional level Active Directory instances
to ldap-brute.
+ Added detection for valid credentials where the target account was
expired or limited by time or login host constraints.
+ Added support for specifying a UPN suffix to be appended to usernames
when brute forcing Microsoft Active Directory accounts.
+ Added support for saving discovered credentials to a CSV file.
+ Now reports valid credentials as they are discovered when the script
is run with -vv or higher.
[Tom Sellers]
o [NSE] ldap-search.nse - Added support for saving search results to
CSV. This is done by using the ldap.savesearch script argument to
specify an output filename prefix. [Tom Sellers]
o [NSE] Updated smb-brute to add detection for valid credentials where the
target account was expired or limited by time or login host constraints.
[Tom Sellers]
o [NSE] Updated account status text in brute force password discovery
scripts in an effort to make the reporting more consistent across
all scripts. This will have an impact on any code that parses these
values. [Tom Sellers]
- remove stale mastersite
- bump USE_PYTHON to 2.5+
- use databases/py-sqlite3 instead of databases/py-pysqlite2x
- set WITHOUT_PSYCO if python 2.6+ since py-psyco doesn't work with it
- switch from custom do-build and do-install targets to USE_PYDISTUTILS
- add INSTALLS_ICONS, remove INSTALLS_EGGINFO (pydistutils will handle it)
- update WWW
- update pkg-plist
- patch out documentation build
PR: ports/160072
Submitted by: Ruslan Mahmatkhanov <cvs-src@yandex.ru>
Approved by: maintainer timeout (30 days)
Approved by: bapt (mentor)
Changes over original shar file at the PR:
. change the maintainer to emulation@ (since it's an infrastructure linux port);
. use the latest version of the package (2.4.2-5.fc10);
. fix pkg-plist.
PR: ports/159007
Submitted by: Stas Timokhin <devel@stasyan.com>
components.
Changes over original shar file at the PR:
. change the maintainer to emulation@ (since it's an infrastructure linux port);
. add BRANDELF_FILES;
. fix pkg-plist.
PR: ports/159007
Submitted by: Stas Timokhin <devel@stasyan.com>
code used in GnuPG.
Changes over original shar file at the PR:
. change the maintainer to emulation@ (since it's an infrastructure linux port);
. use the latest version of the package (1.4.4-1.fc10);
. use PLIST_FILES, PLIST_DIRSTRY and post-install target instead of pkg-plist.
Notes: the port uses ${PREFIX}/etc/gcrypt directory for configuration files
(i.e. /compat/linux/etc/gcrypt). We usually try to use FreeBSD directories.
But there is no [/usr/local/]/etc/gcrypt directory.
I'm open to ideas on what to do here.
PR: ports/159007
Submitted by: Stas Timokhin <devel@stasyan.com>
Changes over original shar file at the PR:
. change the maintainer to emulation@ (since it's an infrastructure linux port);
. remove commented out lines;
. use PLIST_FILES, DOCSDIR_REL and PORTDOCS instead of pkg-plist.
PR: ports/159007
Submitted by: Stas Timokhin <devel@stasyan.com>
2011-09-11 games/abuse: BROKEN after games/abuse_sdl update
2011-09-01 security/donkey: No more public distfiles
2011-09-01 graphics/moth: No more public distfiles
2011-09-01 net-mgmt/aguri: No more public distfiles
2011-09-01 games/senso: No more public distfiles
2011-09-01 net-im/jabber-users-agent: No more public distfiles
2011-09-01 games/cchess: No more public distfiles
- patch program to not use old pysqlite
- fix whitespace issue in pkg-descr
- bump portrevision
PR: ports/160288
Submitted by: Ruslan Mahmatkhanov <cvs-src@yandex.ru>
Approved by: maintainer timeout (23 days)
Approved by: sahil (mentor)
2011-09-01 sysutils/wots: No more public distfiles
2011-09-15 sysutils/gpart: Upstream disappeared
2011-09-01 sysutils/plod: No more public distfiles
2011-09-01 sysutils/checkservice: BROKEN for more than 6 month
2011-09-01 security/nsm-console: BROKEN for more than 6 month
2011-09-01 security/fressh: No more public distfiles
2011-09-01 palm/pose: No more public distfiles
2011-09-01 palm/isilo: No more public distfiles
2011-09-01 news/ija: BROKEN for more than 6 month
2011-09-01 news/PicMonger: Abandonware