diff options
author | jadawin <jadawin@FreeBSD.org> | 2008-05-21 15:40:17 +0800 |
---|---|---|
committer | jadawin <jadawin@FreeBSD.org> | 2008-05-21 15:40:17 +0800 |
commit | a9db3228d05da28c5a8ad55fbb8a73523fa6377a (patch) | |
tree | 4723bec2fc64a8798e59a96613eac7db1c97cb7b | |
parent | 2d49cbe8fc1393bcc80d0e66a8da69d4665424e8 (diff) | |
download | freebsd-ports-gnome-a9db3228d05da28c5a8ad55fbb8a73523fa6377a.tar.gz freebsd-ports-gnome-a9db3228d05da28c5a8ad55fbb8a73523fa6377a.tar.zst freebsd-ports-gnome-a9db3228d05da28c5a8ad55fbb8a73523fa6377a.zip |
- Add net-p2p/peercast entry.
Reviewed by: miwi
Approved by: mentor (implicit)
-rw-r--r-- | security/vuxml/vuln.xml | 27 |
1 files changed, 27 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 8279c6c0e38e..ad2c40ebd137 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,33 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="402ae710-26a2-11dd-ae05-825f4c35000a"> + <topic>peercast -- arbitrary code execution</topic> + <affects> + <package> + <name>peercast</name> + <range><gt>0</gt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Nico Golde discovered that PeerCast, a P2P audio and + video streaming server, is vulnerable to a buffer overflow + in the HTTP Basic Authentication code, allowing a remote + attacker to crash PeerCast or execure arbitrary code.</p> + </body> + </description> + <references> + <bid>28986</bid> + <cvename>CVE-2008-2040</cvename> + <url>http://secunia.com/advisories/30020</url> + </references> + <dates> + <discovery>2008-05-20</discovery> + <entry>2008-05-21</entry> + </dates> + </vuln> + <vuln vid="f5a76faf-244c-11dd-b143-0211d880e350"> <topic>libvorbis -- various security issues</topic> <affects> |