diff options
author | eik <eik@FreeBSD.org> | 2004-07-29 04:33:37 +0800 |
---|---|---|
committer | eik <eik@FreeBSD.org> | 2004-07-29 04:33:37 +0800 |
commit | 8b89d0bd64e0e80209f55028fdd9673f584dc8f6 (patch) | |
tree | 2402549df96086cc44a9a596f52bd9c9a4df8091 /security/portaudit-db | |
parent | 1ac687102adecc1acc67ecfde152318c01d27c2d (diff) | |
download | freebsd-ports-gnome-8b89d0bd64e0e80209f55028fdd9673f584dc8f6.tar.gz freebsd-ports-gnome-8b89d0bd64e0e80209f55028fdd9673f584dc8f6.tar.zst freebsd-ports-gnome-8b89d0bd64e0e80209f55028fdd9673f584dc8f6.zip |
SoX buffer overflows when handling .WAV files
Diffstat (limited to 'security/portaudit-db')
-rw-r--r-- | security/portaudit-db/database/portaudit.txt | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt index 1bd72d8db260..547a8510a8da 100644 --- a/security/portaudit-db/database/portaudit.txt +++ b/security/portaudit-db/database/portaudit.txt @@ -50,5 +50,6 @@ l2tpd<=0.69_2|http://www.securityfocus.com/archive/1/365211 http://cve.mitre.org dropbear<0.43|http://matt.ucc.asn.au/dropbear/dropbear.html http://secunia.com/advisories/12153|Dropbear DSS verification vulnerability|0316f983-dfb6-11d8-9b0a-000347a4fa7d nessus<2.0.12|http://www.osvdb.org/8167 http://secunia.com/advisories/12127 http://www.securityfocus.com/bid/10784|Nessus "adduser" race condition vulnerability|054e4aad-dfb6-11d8-9b0a-000347a4fa7d nessus-devel>=2.*<2.1.1|http://www.osvdb.org/8167 http://secunia.com/advisories/12127 http://www.securityfocus.com/bid/10784|Nessus "adduser" race condition vulnerability|054e4aad-dfb6-11d8-9b0a-000347a4fa7d -pavuk<=0.9.28_5|http://secunia.com/advisories/12152 http://www.gentoo.org/cgi-bin/viewcvs.cgi/net-misc/pavuk/files/pavuk-0.9.28-digest_auth.c.patch|pavuk digest auth buffer overflow|f67ea071-dfb8-11d8-9b0a-000347a4fa7d +pavuk<=0.9.28_5|http://www.securityfocus.com/archive/1/370248 http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1119.html http://secunia.com/advisories/12152 http://www.gentoo.org/cgi-bin/viewcvs.cgi/net-misc/pavuk/files/pavuk-0.9.28-digest_auth.c.patch|pavuk digest auth buffer overflow|f67ea071-dfb8-11d8-9b0a-000347a4fa7d lcdproc<0.4.5|http://sourceforge.net/project/shownotes.php?release_id=230910 http://secunia.com/advisories/11333 http://www.securityfocus.com/archive/1/360209 http://www.securityfocus.com/bid/10085 http://www.osvdb.org/5157 http://www.osvdb.org/5158 http://www.osvdb.org/5159 http://www.osvdb.org/5160|LCDProc buffer overflow/format string vulnerabilities|62d23317-e072-11d8-9a79-000347dd607f +sox>=12.17.1<=12.17.4_1|http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0557|SoX buffer overflows when handling .WAV files|3e4ffe76-e0d4-11d8-9b0a-000347a4fa7d |