diff options
author | delphij <delphij@FreeBSD.org> | 2013-08-10 01:22:16 +0800 |
---|---|---|
committer | delphij <delphij@FreeBSD.org> | 2013-08-10 01:22:16 +0800 |
commit | 77c78d9d4e8ecd735d72e30bdbd3a5761d62613e (patch) | |
tree | 54c2082ee80335d5a5410e30571ff0da23c27f40 | |
parent | a2c8ef452e549c784815a7183ec7a83611bb3de9 (diff) | |
download | freebsd-ports-gnome-77c78d9d4e8ecd735d72e30bdbd3a5761d62613e.tar.gz freebsd-ports-gnome-77c78d9d4e8ecd735d72e30bdbd3a5761d62613e.tar.zst freebsd-ports-gnome-77c78d9d4e8ecd735d72e30bdbd3a5761d62613e.zip |
Document Samba DoS vulnerability.
-rw-r--r-- | security/vuxml/vuln.xml | 43 |
1 files changed, 43 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 4870de8c1bcf..74613bbb1008 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -51,6 +51,49 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="e21c7c7a-0116-11e3-9e83-3c970e169bc2"> + <topic>samba -- denial of service vulnerability</topic> + <affects> + <package> + <name>samba34</name> + <range><gt>0</gt></range> + </package> + <package> + <name>samba35</name> + <range><gt>0</gt></range> + </package> + <package> + <name>samba36</name> + <range><gt>3.6.*</gt><lt>3.6.17</lt></range> + </package> + <package> + <name>samba4</name> + <range><gt>4.0.*</gt><lt>4.0.8</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Samba project reports:</p> + <blockquote cite="http://www.samba.org/samba/security/CVE-2013-4124"> + <p>All current released versions of Samba are vulnerable to + a denial of service on an authenticated or guest connection. + A malformed packet can cause the smbd server to loop the CPU + performing memory allocations and preventing any further service.</p> + <p>A connection to a file share, or a local account is needed + to exploit this problem, either authenticated or unauthenticated + if guest connections are allowed.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2013-4124</cvename> + </references> + <dates> + <discovery>2013-08-05</discovery> + <entry>2013-08-09</entry> + </dates> + </vuln> + <vuln vid="0998e79d-0055-11e3-905b-0025905a4771"> <topic>mozilla -- multiple vulnerabilities</topic> <affects> |