diff options
author | nectar <nectar@FreeBSD.org> | 2005-06-18 01:00:17 +0800 |
---|---|---|
committer | nectar <nectar@FreeBSD.org> | 2005-06-18 01:00:17 +0800 |
commit | b980ca67300f4b2405cf35a9f2395f50b70b0821 (patch) | |
tree | 261f6cb25ed6400da437d0eff8c23ad1737b69d8 | |
parent | 737b607eba54d104be185ec2587df1875d9c0819 (diff) | |
download | freebsd-ports-gnome-b980ca67300f4b2405cf35a9f2395f50b70b0821.tar.gz freebsd-ports-gnome-b980ca67300f4b2405cf35a9f2395f50b70b0821.tar.zst freebsd-ports-gnome-b980ca67300f4b2405cf35a9f2395f50b70b0821.zip |
Document fd_set overruns reported by 3APA3A.
-rw-r--r-- | security/vuxml/vuln.xml | 49 |
1 files changed, 49 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index de8893e9eb4d..f84a39233a40 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,55 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="4c005a5e-2541-4d95-80a0-00c76919aa66"> + <topic>fd_set -- bitmap index overflow in multiple applications</topic> + <affects> + <package> + <name>gatekeeper</name> + <range><lt>2.2.1</lt></range> + </package> + <package> + <name>citadel</name> + <range><lt>6.29</lt></range> + </package> + <package> + <name>3proxy</name> + <range><lt>0.5.b</lt></range> + </package> + <package> + <name>jabber</name> + <name>bnc</name> + <name>dante</name> + <name>rinetd</name> + <name>bld</name> + <range><ge>0</ge></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>3APA3A reports:</p> + <blockquote cite="http://www.security.nnov.ru/advisories/sockets.asp"> + <p>If programmer fails to check socket number before using + select() or fd_set macros, it's possible to overwrite + memory behind fd_set structure. Very few select() based + application actually check FD_SETSIZE value. <em>[...]</em></p> + <p>Depending on vulnerable application it's possible to + overwrite portions of memory. Impact is close to + off-by-one overflows, code execution doesn't seems + exploitable.</p> + </blockquote> + </body> + </description> + <references> + <url>http://www.security.nnov.ru/advisories/sockets.asp</url> + <mlist msgid="1473827718.20050124233008@security.nnov.ru">http://marc.theaimsgroup.com/?l=bugtraq&m=110660879328901</mlist> + </references> + <dates> + <discovery>2004-12-12</discovery> + <entry>2005-06-17</entry> + </dates> + </vuln> + <vuln vid="b5ffaa2a-ee50-4498-af99-61bc1b163c00"> <topic>leafnode -- denial of service vulnerability</topic> <affects> |