aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorremko <remko@FreeBSD.org>2005-11-26 18:54:21 +0800
committerremko <remko@FreeBSD.org>2005-11-26 18:54:21 +0800
commit2aee599027fa199ef3b5a3d54ca5a1745e1cc2b7 (patch)
tree68588ffdc9e06e3b0535c5953df1b0a64e118b85
parent54a4471c56d029007503a6f60c9fcfa53034bb27 (diff)
downloadfreebsd-ports-gnome-2aee599027fa199ef3b5a3d54ca5a1745e1cc2b7.tar.gz
freebsd-ports-gnome-2aee599027fa199ef3b5a3d54ca5a1745e1cc2b7.tar.zst
freebsd-ports-gnome-2aee599027fa199ef3b5a3d54ca5a1745e1cc2b7.zip
Standarize the horde -- Cross site scripting vulnerabilities in MIME
viewers entry as per the FDP-primer and the vuxml layout (topic). Also correct the qpopper vulnerability to match 4.0 and above since the 2.x range is listed as affected at the moment but has an entirely different base. After checking it appears that the information all point to >= 4.0. [1] Noticed by: ache [1]
-rw-r--r--security/vuxml/vuln.xml26
1 files changed, 16 insertions, 10 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 16039d33a8aa..a4046eb11a4e 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -36,7 +36,7 @@ Note: Please add new entries to the beginning of this file.
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="873a6542-5b8d-11da-b96e-000fb586ba73">
- <topic>Horde -- Cross site scripting vulnerabilities in MIME viewers.</topic>
+ <topic>horde -- Cross site scripting vulnerabilities in MIME viewers.</topic>
<affects>
<package>
<name>horde</name>
@@ -48,23 +48,28 @@ Note: Please add new entries to the beginning of this file.
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Annouce of Horde 3.0.7 (final):</p>
<blockquote cite="http://lists.horde.org/archives/announce/2005/000232.html">
- <p>This [3.0.7] is a security release that fixes cross site scripting vulnerabilities in
- two of Horde's MIME viewers. These holes could for example be exploited by an
- attacker sending specially crafted emails to Horde's webmail client IMP. The
- attack could be used to steal users' identity information, taking over users'
- sessions, or changing users' settings.</p>
- <p>As a hotfix the css and tgz MIME drivers can be disabled by removing their
- entries from the $mime_drivers_map['horde']['registered'] list in
- horde/config/mime_drivers.php.</p>
+ <p>This [3.0.7] is a security release that fixes cross site
+ scripting vulnerabilities in two of Horde's MIME viewers. These
+ holes could for example be exploited by an attacker sending
+ specially crafted emails to Horde's webmail client IMP. The
+ attack could be used to steal users' identity information, taking
+ over users' sessions, or changing users' settings.</p>
+ <p>As a hotfix the css and tgz MIME drivers can be disabled by
+ removing their entries from the
+ $mime_drivers_map['horde']['registered'] list in
+ horde/config/mime_drivers.php.</p>
</blockquote>
</body>
</description>
<references>
+ <bid>15535</bid>
+ <cvename>CVE-2005-3759</cvename>
<url>http://lists.horde.org/archives/announce/2005/000232.html</url>
</references>
<dates>
<discovery>2005-11-22</discovery>
<entry>2005-11-22</entry>
+ <modified>2005-11-26</modified>
</dates>
</vuln>
@@ -249,7 +254,7 @@ Note: Please add new entries to the beginning of this file.
<affects>
<package>
<name>qpopper</name>
- <range><le>4.0.5</le></range>
+ <range><ge>4.0</ge><le>4.0.5</le></range>
</package>
</affects>
<description>
@@ -273,6 +278,7 @@ Note: Please add new entries to the beginning of this file.
<dates>
<discovery>2005-05-26</discovery>
<entry>2005-11-07</entry>
+ <modified>2005-11-26</modified>
</dates>
</vuln>