aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorjosef <josef@FreeBSD.org>2004-10-15 00:55:27 +0800
committerjosef <josef@FreeBSD.org>2004-10-15 00:55:27 +0800
commit7b7a8da883eb5c6a77d49b1002cbe1e6419a85fd (patch)
tree757f1de66edd938a798fe09a15b15071a9fb2b0d
parent7eff0c729258a27592da1b91ebbde0bc80aa9f50 (diff)
downloadfreebsd-ports-gnome-7b7a8da883eb5c6a77d49b1002cbe1e6419a85fd.tar.gz
freebsd-ports-gnome-7b7a8da883eb5c6a77d49b1002cbe1e6419a85fd.tar.zst
freebsd-ports-gnome-7b7a8da883eb5c6a77d49b1002cbe1e6419a85fd.zip
Document two seperate security vulnerabilities in
icecast1 and icecast2. Approved by: nectar
-rw-r--r--security/vuxml/vuln.xml55
1 files changed, 52 insertions, 3 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 1d4881f2f865..b8a2af85236e 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,56 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="b2cfb400-1df0-11d9-a859-0050fc56d258">
+ <topic>icecast -- Cross-Site Scripting Vulnerability</topic>
+ <affects>
+ <package>
+ <name>icecast</name>
+ <range><lt>1.3.12_2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Caused by improper filtering of HTML code in the
+ status display, it is possible for a remote user
+ to execute scripting code in the target user's
+ browser.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CAN-2004-0781</cvename>
+ <url>http://www.securitytracker.com/alerts/2004/Aug/1011047.html</url>
+ </references>
+ <dates>
+ <discovery>2004-08-24</discovery>
+ <entry>2004-10-13</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="741c3957-1d69-11d9-a804-0050fc56d258">
+ <topic>icecast -- HTTP header overflow</topic>
+ <affects>
+ <package>
+ <name>icecast2</name>
+ <range><lt>2.0.2,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>It is possible to execute remote code simply using
+ HTTP request plus 31 headers followed by a shellcode that will be
+ executed directly.</p>
+ </body>
+ </description>
+ <references>
+ <mlist msgid="20040928184943.0a82b6f6.aluigi@autistici.org">http://marc.theaimsgroup.com/?l=full-disclosure&amp;m=109646043512722</mlist>
+ </references>
+ <dates>
+ <discovery>2004-09-29</discovery>
+ <entry>2004-10-13</entry>
+ </dates>
+ </vuln>
+
<vuln vid="20dfd134-1d39-11d9-9be9-000c6e8f12e">
<topic>freeradius -- denial-of-service vulnerability</topic>
<affects>
@@ -59,10 +109,10 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
</vuln>
<vuln vid="76301302-1d59-11d9-814e-0001020eed82">
- <topic>xerces-c2 -- Attribute blowup denial-of-service</topic>
+ <topic>xerces_c -- Attribute blowup denial-of-service</topic>
<affects>
<package>
- <name>xerces-c2</name>
+ <name>xerces_c</name>
<range><lt>2.6.0</lt></range>
</package>
</affects>
@@ -85,7 +135,6 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
<dates>
<discovery>2004-10-02</discovery>
<entry>2004-10-13</entry>
- <modified>2004-10-14</modified>
</dates>
</vuln>