diff options
author | beech <beech@FreeBSD.org> | 2007-11-06 17:58:50 +0800 |
---|---|---|
committer | beech <beech@FreeBSD.org> | 2007-11-06 17:58:50 +0800 |
commit | 4dd1eb2839b06b742b654f4a688767de1fc29b71 (patch) | |
tree | bf9f9ed75e192abd75636618fdd07ce39db5cf34 | |
parent | 85375a47e6e6c7459b58850a6275b12adbd2e0e7 (diff) | |
download | freebsd-ports-gnome-4dd1eb2839b06b742b654f4a688767de1fc29b71.tar.gz freebsd-ports-gnome-4dd1eb2839b06b742b654f4a688767de1fc29b71.tar.zst freebsd-ports-gnome-4dd1eb2839b06b742b654f4a688767de1fc29b71.zip |
- Add entry for mail/perdition
PR: ports/117796
Approved by: portmgr (pav), linimon (mentor)
-rw-r--r-- | security/vuxml/vuln.xml | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index b30db3ca881b..b964ec32f0d4 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,37 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="617a4021-8bf0-11dc-bffa-0016179b2dd5"> + <topic>perdition -- str_vwrite format string vulnerability</topic> + <affects> + <package> + <name>perdition</name> + <range><lt>1.17</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>SEC-Consult reports:</p> + <blockquote cite="http://www.sec-consult.com/300.html"> + <p>Perdition IMAP is affected by a format string bug in one of its + IMAP output-string formatting functions. The bug allows the + execution of arbitrary code on the affected server. + A successful exploit does not require prior authentication.</p> + </blockquote> + </body> + </description> + <references> + <bid>26270</bid> + <cvename>CVE-2007-5740</cvename> + <url>http://www.sec-consult.com/300.html</url> + <url>http://secunia.com/advisories/27458</url> + </references> + <dates> + <discovery>2007-10-31</discovery> + <entry>2007-11-05</entry> + </dates> + </vuln> + <vuln vid="f8b0f83c-8bb3-11dc-bffa-0016179b2dd5"> <topic>gftp -- multiple vulnerabilities</topic> <affects> |