aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
authorume <ume@FreeBSD.org>2009-05-15 09:49:18 +0800
committerume <ume@FreeBSD.org>2009-05-15 09:49:18 +0800
commit5f83dea8f2fc2e03c2bc3ad72b6c47d81d801aa5 (patch)
tree7c8be96596569fa30fb74e7602c57b8c3a9ad82f /security/vuxml/vuln.xml
parentce3f191d9a5e18407e3fc3614a3fb23c9fa711f2 (diff)
downloadfreebsd-ports-gnome-5f83dea8f2fc2e03c2bc3ad72b6c47d81d801aa5.tar.gz
freebsd-ports-gnome-5f83dea8f2fc2e03c2bc3ad72b6c47d81d801aa5.tar.zst
freebsd-ports-gnome-5f83dea8f2fc2e03c2bc3ad72b6c47d81d801aa5.zip
- Document cyrus-sasl -- buffer overflow vulnerability
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml29
1 files changed, 29 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index ce4e3e81f92e..acce8c421962 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,35 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="14ab174c-40ef-11de-9fd5-001bd3385381">
+ <topic>cyrus-sasl -- buffer overflow vulnerability</topic>
+ <affects>
+ <package>
+ <name>cyrus-sasl</name>
+ <range><lt>2.1.23</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>US-CERT reports:</p>
+ <blockquote cite="http://www.kb.cert.org/vuls/id/238019">
+ <p>The sasl_encode64() function converts a string into
+ base64. The Cyrus SASL library contains buffer overflows
+ that occur because of unsafe use of the sasl_encode64()
+ function. </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2009-0688</cvename>
+ <url>http://www.kb.cert.org/vuls/id/238019</url>
+ </references>
+ <dates>
+ <discovery>2009-04-08</discovery>
+ <entry>2009-05-15</entry>
+ </dates>
+ </vuln>
+
<vuln vid="fc4d0ae8-3fa3-11de-a3fd-0030843d3802">
<topic>moinmoin -- multiple cross site scripting vulnerabilities</topic>
<affects>