aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authortrhodes <trhodes@FreeBSD.org>2004-08-14 05:31:53 +0800
committertrhodes <trhodes@FreeBSD.org>2004-08-14 05:31:53 +0800
commit40e11e3b4c46c09a74cf8caade75669c38c15777 (patch)
treecf68fe2694a51a7facaf4c85cf4de351e866ceb3
parentc4220d1937902b33b19218a1a3bf8739dd6d45f1 (diff)
downloadfreebsd-ports-gnome-40e11e3b4c46c09a74cf8caade75669c38c15777.tar.gz
freebsd-ports-gnome-40e11e3b4c46c09a74cf8caade75669c38c15777.tar.zst
freebsd-ports-gnome-40e11e3b4c46c09a74cf8caade75669c38c15777.zip
Format string vulnerability in jftpgw.
Informed by: Robert Nagy <robert@openbsd.org>
-rw-r--r--security/vuxml/vuln.xml28
1 files changed, 28 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index bc50aa632445..246f7ecb24ab 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,34 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="65a17a3f-ed6e-11d8-aff1-00061bc2ad93">
+ <topic>Arbitrary code execution via a format string vulnerability</topic>
+ <affects>
+ <package>
+ <name>jftpgw</name>
+ <range><lt>0.13.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The log functions in jftpgw may allow
+ remotely authenticated user to execute
+ arbitrary code via the format string
+ specifiers in certain syslog messages.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CAN-2004-0448</cvename>
+ <url>http://www.debian.org/security/2004/dsa-510</url>
+ <url>http://www.securityfocus.com/bid/10438</url>
+ <url>http://xforce.iss.net/xforce/xfdb/16271</url>
+ </references>
+ <dates>
+ <discovery>2004-05-30</discovery>
+ <entry>2004-08-13</entry>
+ </dates>
+ </vuln>
+
<vuln vid="641859e8-eca1-11d8-b913-000c41e2cdad">
<topic>KDE Konqueror frame injection vulnerability</topic>
<affects>