aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authormnag <mnag@FreeBSD.org>2006-12-13 20:37:17 +0800
committermnag <mnag@FreeBSD.org>2006-12-13 20:37:17 +0800
commitf6df9e67cbe8aa509adda747e0c3bcbe05c8c99b (patch)
tree298dc9c776403288554a597f8e4b1ea1e1c460be
parentf5063318efcf030fbf6b9226a18330b4b5a27f5e (diff)
downloadfreebsd-ports-gnome-f6df9e67cbe8aa509adda747e0c3bcbe05c8c99b.tar.gz
freebsd-ports-gnome-f6df9e67cbe8aa509adda747e0c3bcbe05c8c99b.tar.zst
freebsd-ports-gnome-f6df9e67cbe8aa509adda747e0c3bcbe05c8c99b.zip
- wv2 -- Integer Overflow Vulnerability
-rw-r--r--security/vuxml/vuln.xml32
1 files changed, 32 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 20514bbce0af..34dc60eefc71 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,38 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="b9044cc2-8aa5-11db-bd0d-00123ffe8333">
+ <topic>wv2 -- Integer Overflow Vulnerability</topic>
+ <affects>
+ <package>
+ <name>wv2</name>
+ <range><lt>0.2.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Secunia reports:</p>
+ <blockquote cite="http://secunia.com/advisories/20665/">
+ <p>A vulnerability has been reported in wvWare wv2 Library, which
+ potentially can be exploited by malicious people to compromise an
+ application using the library.</p>
+ <p>The vulnerability is caused due to an integer overflow error in
+ "word_helper.h" when handling a Word document. This can be
+ exploited to cause a buffer overflow and may allow arbitrary code
+ execution via a specially crafted Word document.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2006-2197</cvename>
+ <url>http://secunia.com/advisories/20665/</url>
+ </references>
+ <dates>
+ <discovery>2006-06-12</discovery>
+ <entry>2006-12-13</entry>
+ </dates>
+ </vuln>
+
<vuln vid="e969e6cb-8911-11db-9d01-0016179b2dd5">
<topic>tnftpd -- Remote root Exploit</topic>
<affects>