diff options
author | josef <josef@FreeBSD.org> | 2004-10-13 05:58:58 +0800 |
---|---|---|
committer | josef <josef@FreeBSD.org> | 2004-10-13 05:58:58 +0800 |
commit | 36f980146eeb74eea1bf0a7cddb1e983dc12624f (patch) | |
tree | 3d1bd0477e02b975c04d0ea977beb63a50121afc | |
parent | 57a3ff49e18c424a7f5df6af76c28d7c902c7961 (diff) | |
download | freebsd-ports-gnome-36f980146eeb74eea1bf0a7cddb1e983dc12624f.tar.gz freebsd-ports-gnome-36f980146eeb74eea1bf0a7cddb1e983dc12624f.tar.zst freebsd-ports-gnome-36f980146eeb74eea1bf0a7cddb1e983dc12624f.zip |
Document 2 DoS attacks possible against
older versions of mail-notifier.
Based on the security advisories
mentioned in the reference links.
Approved by: nectar
-rw-r--r-- | security/vuxml/vuln.xml | 27 |
1 files changed, 27 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 4df82f2c02f7..feda937dd423 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,33 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="3030ae22-1c7f-11d9-81a4-0050fc56d258"> + <topic>mail-notification -- denial-of-service vulnerability</topic> + <affects> + <package> + <name>mail-notification</name> + <range><lt>0.7.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Caused by an untested return value, and a resulting + null pointer dereference, it is possible for an attacker + to crash the application. However, the attacker must first + hijack the connection between Mail Notification and the + Gmail or IMAP server.</p> + </body> + </description> + <references> + <url>http://www.nongnu.org/mailnotify/sa/mail-notification-SA-04:2.asc</url> + <url>http://www.nongnu.org/mailnotify/sa/mail-notification-SA-04:3.asc</url> + </references> + <dates> + <discovery>2004-10-06</discovery> + <entry>2004-10-12</entry> + </dates> + </vuln> + <vuln vid="65e99f52-1c5f-11d9-bc4a-000c41e2cdad"> <topic>squid -- SNMP module denial-of-service vulnerability</topic> <affects> |