diff options
author | eik <eik@FreeBSD.org> | 2004-07-05 23:30:35 +0800 |
---|---|---|
committer | eik <eik@FreeBSD.org> | 2004-07-05 23:30:35 +0800 |
commit | a635b5a7161f3ec7df52f3aa196ca5ce5dd5cac6 (patch) | |
tree | f63a076e8cfd4e123be2fc65d61991eea9041358 | |
parent | 4eed168a1713285743e4331f88d4f9cc10d19f57 (diff) | |
download | freebsd-ports-gnome-a635b5a7161f3ec7df52f3aa196ca5ce5dd5cac6.tar.gz freebsd-ports-gnome-a635b5a7161f3ec7df52f3aa196ca5ce5dd5cac6.tar.zst freebsd-ports-gnome-a635b5a7161f3ec7df52f3aa196ca5ce5dd5cac6.zip |
Mark 4aec9d58-ce7b-11d8-858d-000d610a3b12 as a duplicate of the
already existing c63936c1-caed-11d8-8898-000d6111a684.
-rw-r--r-- | ports-mgmt/portaudit-db/database/portaudit.txt | 1 | ||||
-rw-r--r-- | ports-mgmt/portaudit-db/database/portaudit.xlist | 1 | ||||
-rw-r--r-- | ports-mgmt/portaudit-db/database/portaudit.xml | 27 | ||||
-rw-r--r-- | security/portaudit-db/database/portaudit.txt | 1 | ||||
-rw-r--r-- | security/portaudit-db/database/portaudit.xlist | 1 | ||||
-rw-r--r-- | security/portaudit-db/database/portaudit.xml | 27 |
6 files changed, 56 insertions, 2 deletions
diff --git a/ports-mgmt/portaudit-db/database/portaudit.txt b/ports-mgmt/portaudit-db/database/portaudit.txt index c569699b4c1e..945d85fb0388 100644 --- a/ports-mgmt/portaudit-db/database/portaudit.txt +++ b/ports-mgmt/portaudit-db/database/portaudit.txt @@ -36,4 +36,3 @@ libxine<1.0.r4|http://www.xinehq.de/index.php/security/XSA-2004-3 http://cve.mit apache>=2.*<2.0.49_3|http://www.guninski.com/httpd1.html http://www.apacheweek.com/features/security-20 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0493 http://secunia.com/advisories/11956 http://www.osvdb.org/7269|Apache input header folding DoS vulnerability|81a8c9c2-c94f-11d8-8898-000d6111a684 isakmpd<20040611|http://lists.netsys.com/pipermail/full-disclosure/2004-June/022399.html http://www.osvdb.org/6951 http://www.secunia.com/advisories/11827 http://www.securityfocus.com/bid/10496|isakmpd security association deletion vulnerability|9a73a5b4-c9b5-11d8-95ca-02e081301d81 krb5<1.3.4|http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-001-an_to_ln.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0523 http://www.osvdb.org/6846 http://secunia.com/advisories/11753 http://www.kb.cert.org/vuls/id/686862 http://www.securityfocus.com/bid/10448|MIT Kerberos 5 krb5_aname_to_localname() buffer overflow|5177b6e5-c9b7-11d8-95ca-02e081301d81 -SSLtelnet<=0.13_1|http://lists.freebsd.org/pipermail/freebsd-ports/2004-June/013878.html|SSLtelnet remote format string vulnerability|c63936c1-caed-11d8-8898-000d6111a684 diff --git a/ports-mgmt/portaudit-db/database/portaudit.xlist b/ports-mgmt/portaudit-db/database/portaudit.xlist index 48700b58868a..bebf52fd1262 100644 --- a/ports-mgmt/portaudit-db/database/portaudit.xlist +++ b/ports-mgmt/portaudit-db/database/portaudit.xlist @@ -2,3 +2,4 @@ # $FreeBSD$ 3362f2c1-8344-11d8-a41f-0020ed76ef5a 5e7f58c3-b3f8-4258-aeb8-795e5e940ff8 +4aec9d58-ce7b-11d8-858d-000d610a3b12 diff --git a/ports-mgmt/portaudit-db/database/portaudit.xml b/ports-mgmt/portaudit-db/database/portaudit.xml index c0d547850c97..793d1189cc66 100644 --- a/ports-mgmt/portaudit-db/database/portaudit.xml +++ b/ports-mgmt/portaudit-db/database/portaudit.xml @@ -59,6 +59,7 @@ This file is in the public domain. <url>http://www.mplayerhq.hu/</url> <url>http://www.securityfocus.com/archive/1/359029</url> <url>http://www.securityfocus.com/archive/1/359025</url> + <cvename>CAN-2004-0386</cvename> </references> <dates> <discovery>2004-03-29</discovery> @@ -70,4 +71,30 @@ This file is in the public domain. <cancelled superseded="1a448eb7-6988-11d8-873f-0020ed76ef5a"/> </vuln> + <vuln vid="4aec9d58-ce7b-11d8-858d-000d610a3b12"> + <cancelled superseded="c63936c1-caed-11d8-8898-000d6111a684"/> + </vuln> + + <vuln vid="c63936c1-caed-11d8-8898-000d6111a684"> + <topic>SSLtelnet remote format string vulnerability</topic> + <affects> + <package> + <name>SSLtelnet</name> + <range><le>0.13_1</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>SSLtelnet contains a format string vulnerability + that could allow remote code execution.</p> + </body> + </description> + <references> + <mlist msgid="FB24803D1DF2A34FA59FC157B77C970502D684B7@idserv04.idef.com">http://lists.freebsd.org/pipermail/freebsd-ports/2004-June/013878.html</mlist> + </references> + <dates> + <discovery>2003-04-03</discovery> + <entry>2004-06-30</entry> + </dates> + </vuln> </vuxml> diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt index c569699b4c1e..945d85fb0388 100644 --- a/security/portaudit-db/database/portaudit.txt +++ b/security/portaudit-db/database/portaudit.txt @@ -36,4 +36,3 @@ libxine<1.0.r4|http://www.xinehq.de/index.php/security/XSA-2004-3 http://cve.mit apache>=2.*<2.0.49_3|http://www.guninski.com/httpd1.html http://www.apacheweek.com/features/security-20 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0493 http://secunia.com/advisories/11956 http://www.osvdb.org/7269|Apache input header folding DoS vulnerability|81a8c9c2-c94f-11d8-8898-000d6111a684 isakmpd<20040611|http://lists.netsys.com/pipermail/full-disclosure/2004-June/022399.html http://www.osvdb.org/6951 http://www.secunia.com/advisories/11827 http://www.securityfocus.com/bid/10496|isakmpd security association deletion vulnerability|9a73a5b4-c9b5-11d8-95ca-02e081301d81 krb5<1.3.4|http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-001-an_to_ln.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0523 http://www.osvdb.org/6846 http://secunia.com/advisories/11753 http://www.kb.cert.org/vuls/id/686862 http://www.securityfocus.com/bid/10448|MIT Kerberos 5 krb5_aname_to_localname() buffer overflow|5177b6e5-c9b7-11d8-95ca-02e081301d81 -SSLtelnet<=0.13_1|http://lists.freebsd.org/pipermail/freebsd-ports/2004-June/013878.html|SSLtelnet remote format string vulnerability|c63936c1-caed-11d8-8898-000d6111a684 diff --git a/security/portaudit-db/database/portaudit.xlist b/security/portaudit-db/database/portaudit.xlist index 48700b58868a..bebf52fd1262 100644 --- a/security/portaudit-db/database/portaudit.xlist +++ b/security/portaudit-db/database/portaudit.xlist @@ -2,3 +2,4 @@ # $FreeBSD$ 3362f2c1-8344-11d8-a41f-0020ed76ef5a 5e7f58c3-b3f8-4258-aeb8-795e5e940ff8 +4aec9d58-ce7b-11d8-858d-000d610a3b12 diff --git a/security/portaudit-db/database/portaudit.xml b/security/portaudit-db/database/portaudit.xml index c0d547850c97..793d1189cc66 100644 --- a/security/portaudit-db/database/portaudit.xml +++ b/security/portaudit-db/database/portaudit.xml @@ -59,6 +59,7 @@ This file is in the public domain. <url>http://www.mplayerhq.hu/</url> <url>http://www.securityfocus.com/archive/1/359029</url> <url>http://www.securityfocus.com/archive/1/359025</url> + <cvename>CAN-2004-0386</cvename> </references> <dates> <discovery>2004-03-29</discovery> @@ -70,4 +71,30 @@ This file is in the public domain. <cancelled superseded="1a448eb7-6988-11d8-873f-0020ed76ef5a"/> </vuln> + <vuln vid="4aec9d58-ce7b-11d8-858d-000d610a3b12"> + <cancelled superseded="c63936c1-caed-11d8-8898-000d6111a684"/> + </vuln> + + <vuln vid="c63936c1-caed-11d8-8898-000d6111a684"> + <topic>SSLtelnet remote format string vulnerability</topic> + <affects> + <package> + <name>SSLtelnet</name> + <range><le>0.13_1</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>SSLtelnet contains a format string vulnerability + that could allow remote code execution.</p> + </body> + </description> + <references> + <mlist msgid="FB24803D1DF2A34FA59FC157B77C970502D684B7@idserv04.idef.com">http://lists.freebsd.org/pipermail/freebsd-ports/2004-June/013878.html</mlist> + </references> + <dates> + <discovery>2003-04-03</discovery> + <entry>2004-06-30</entry> + </dates> + </vuln> </vuxml> |