diff options
author | simon <simon@FreeBSD.org> | 2005-01-19 04:25:52 +0800 |
---|---|---|
committer | simon <simon@FreeBSD.org> | 2005-01-19 04:25:52 +0800 |
commit | b3273ffd25a9ddcdcfba722b8588fd4a8693f676 (patch) | |
tree | 19df14093bc42d3dc05eff868dc9b7500f1741c6 | |
parent | 4002509271f2a48409fc839933e68474c4a6d183 (diff) | |
download | freebsd-ports-gnome-b3273ffd25a9ddcdcfba722b8588fd4a8693f676.tar.gz freebsd-ports-gnome-b3273ffd25a9ddcdcfba722b8588fd4a8693f676.tar.zst freebsd-ports-gnome-b3273ffd25a9ddcdcfba722b8588fd4a8693f676.zip |
Document remote DoS in CUPS.
Heads-ups by: Hilko Meyer <hilko.meyer@gmx.de>
Description by: nectar
-rw-r--r-- | security/vuxml/vuln.xml | 25 |
1 files changed, 25 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index e11c2e318f73..212ada8d8cf3 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,31 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="990cf07e-6988-11d9-a9e7-0001020eed82"> + <topic>cups-base -- CUPS server remote DoS vulnerability</topic> + <affects> + <package> + <name>cups-base</name> + <range><ge>1.1.21</ge><lt>1.1.23</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Kenshi Muto discovered that the CUPS server would enter an + infinite loop when processing a URL containing + <q><code>/..</code></q>.</p> + </body> + </description> + <references> + <bid>12200</bid> + <url>http://www.cups.org/str.php?L1042</url> + </references> + <dates> + <discovery>2004-12-30</discovery> + <entry>2005-01-18</entry> + </dates> + </vuln> + <vuln vid="b58ff497-6977-11d9-ae49-000c41e2cdad"> <topic>tiff -- divide-by-zero denial-of-service</topic> <affects> |