diff options
author | delphij <delphij@FreeBSD.org> | 2011-12-24 04:37:32 +0800 |
---|---|---|
committer | delphij <delphij@FreeBSD.org> | 2011-12-24 04:37:32 +0800 |
commit | 12568ac57939a0fc8ed12d8789356481800ffb92 (patch) | |
tree | aa4ac2f04bf9c19d649a36bc71238496ac5f213a | |
parent | cf045ac6e2a228d04324014f299fd964d4715a79 (diff) | |
download | freebsd-ports-gnome-12568ac57939a0fc8ed12d8789356481800ffb92.tar.gz freebsd-ports-gnome-12568ac57939a0fc8ed12d8789356481800ffb92.tar.zst freebsd-ports-gnome-12568ac57939a0fc8ed12d8789356481800ffb92.zip |
Add vuxml entry for proftpd chroot vulnerability.
Feature safe: yes
-rw-r--r-- | security/vuxml/vuln.xml | 34 |
1 files changed, 34 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 5b8ce095da3b..a7634987f86b 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -47,6 +47,40 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="022a4c77-2da4-11e1-b356-00215c6a37bb"> + <topic>proftpd -- arbitrary code execution vulnerability with chroot</topic> + <affects> + <package> + <name>proftpd</name> + <name>proftpd-mysql</name> + <range><lt>1.3.3g_1</lt></range> + </package> + <package> + <name>proftpd-devel</name> + <range><lt>1.3.3.r4_3,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The FreeBSD security advisory FreeBSD-SA-11:07.chroot reports:</p> + <blockquote cite="http://security.freebsd.org/advisories/FreeBSD-SA-11:07.chroot.asc"> + <p>If ftpd is configured to place a user in a chroot + environment, then an attacker who can log in as that + user may be able to run arbitrary code(...).</p> + </blockquote> + <p>Proftpd shares the same problem of a similar nature.</p> + </body> + </description> + <references> + <freebsdsa>SA-11:07.chroot</freebsdsa> + <url>http://seclists.org/fulldisclosure/2011/Nov/452</url> + </references> + <dates> + <discovery>2011-11-30</discovery> + <entry>2011-12-23</entry> + </dates> + </vuln> + <vuln vid="8c83145d-2c95-11e1-89b4-001ec9578670"> <topic>phpMyAdmin -- Multiple XSS</topic> <affects> |