diff options
author | remko <remko@FreeBSD.org> | 2005-09-04 02:06:52 +0800 |
---|---|---|
committer | remko <remko@FreeBSD.org> | 2005-09-04 02:06:52 +0800 |
commit | e0555425b41c009572394f834064123928db207a (patch) | |
tree | bb70ef578cad51e37e8287af6c24466b4fa371e1 | |
parent | b6aa07868fb820e7303bf348921cb665d75a9c9f (diff) | |
download | freebsd-ports-gnome-e0555425b41c009572394f834064123928db207a.tar.gz freebsd-ports-gnome-e0555425b41c009572394f834064123928db207a.tar.zst freebsd-ports-gnome-e0555425b41c009572394f834064123928db207a.zip |
Document bind -- buffer overrun vulnerability
-rw-r--r-- | security/vuxml/vuln.xml | 28 |
1 files changed, 28 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index f4b6a4a3d51c..49dc92fb062c 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,34 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="947f4b14-1c89-11da-bc01-000e0c2e438a"> + <topic>bind -- buffer overrun vulnerability</topic> + <affects> + <package> + <name>bind</name> + <range><ge>8.4.4</ge><lt>8.4.6</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>An ISC advisory reports a buffer overrun vulnerability within + bind. The vulnerability could result in a Denial of Service. + A workaround is available by disabling recursion and glue + fetching.</p> + </body> + </description> + <references> + <certvu>327633</certvu> + <cvename>CAN-2005-0033</cvename> + <url>http://www.uniras.gov.uk/niscc/docs/al-20050125-00059.html?lang=en</url> + <url>http://www.isc.org/sw/bind/bind-security.php</url> + </references> + <dates> + <discovery>2005-01-25</discovery> + <entry>2005-09-03</entry> + </dates> + </vuln> + <vuln vid="08df5d46-1baf-11da-8038-0040f42d58c6"> <topic>urban -- stack overflow vulnerabilities</topic> <affects> |