aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authormiwi <miwi@FreeBSD.org>2009-05-13 16:10:42 +0800
committermiwi <miwi@FreeBSD.org>2009-05-13 16:10:42 +0800
commit08f5d2a3e95d694cff51e5d21c8edaae619421eb (patch)
tree25a0865d3d8d0ac3533d9ced57b5af17c2598952 /security/vuxml
parentfbfca1a2ba16b2caea4205b507268ece96a43622 (diff)
downloadfreebsd-ports-gnome-08f5d2a3e95d694cff51e5d21c8edaae619421eb.tar.gz
freebsd-ports-gnome-08f5d2a3e95d694cff51e5d21c8edaae619421eb.tar.zst
freebsd-ports-gnome-08f5d2a3e95d694cff51e5d21c8edaae619421eb.zip
- Cleanup
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml103
1 files changed, 56 insertions, 47 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 5baefbd517a7..e1b09ebdd375 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -76,9 +76,13 @@ Note: Please add new entries to the beginning of this file.
<topic>wireshark -- multiple vulnerabilities</topic>
<affects>
<package>
- <name>wireshark</name>
- <name>wireshark-lite</name>
- <range><ge>0.99.6</ge><lt>1.0.7</lt></range>
+ <name>ethereal</name>
+ <name>ethereal-lite</name>
+ <name>tethereal</name>
+ <name>tethereal-lite</name>
+ <name>wireshark</name>
+ <name>wireshark-lite</name>
+ <range><lt>1.0.7</lt></range>
</package>
</affects>
<description>
@@ -89,31 +93,34 @@ Note: Please add new entries to the beginning of this file.
<p>Wireshark 1.0.7 fixes the following vulnerabilities:</p>
<ul>
<li>The PROFINET dissector was vulnerable to a format
- string overflow. (Bug 3382) Versions affected: 0.99.6 to
- 1.0.6, CVE-2009-1210.</li>
+ string overflow. (Bug 3382) Versions affected: 0.99.6 to
+ 1.0.6, CVE-2009-1210.</li>
<li>The Check Point High-Availability Protocol (CPHAP)
- dissector could crash. (Bug 3269) Versions affected: 0.9.6
- to 1.0.6; CVE-2009-1268.</li>
+ dissector could crash. (Bug 3269) Versions affected: 0.9.6
+ to 1.0.6; CVE-2009-1268.</li>
<li>Wireshark could crash while loading a Tektronix .rf5
- file. (Bug 3366) Versions affected: 0.99.6 to 1.0.6,
- CVE-2009-1269.</li>
+ file. (Bug 3366) Versions affected: 0.99.6 to 1.0.6,
+ CVE-2009-1269.</li>
</ul>
</blockquote>
</body>
</description>
<references>
+ <bid>34291</bid>
+ <bid>34457</bid>
<cvename>CVE-2009-1210</cvename>
<cvename>CVE-2009-1268</cvename>
<cvename>CVE-2009-1269</cvename>
- <bid>34291</bid>
- <bid>34457</bid>
<url>http://www.wireshark.org/security/wnpa-sec-2009-02.html</url>
+ <url>http://secunia.com/advisories/34542</url>
</references>
<dates>
<discovery>2009-04-06</discovery>
<entry>2009-05-09</entry>
+ <modified>2009-05-13</modified>
</dates>
</vuln>
+
<vuln vid="736e55bc-39bb-11de-a493-001b77d09812">
<topic>cups -- remote code execution and DNS rebinding</topic>
<affects>
@@ -130,39 +137,40 @@ Note: Please add new entries to the beginning of this file.
<p>The following issues were reported in CUPS:</p>
<ul>
<li>iDefense reported an integer overflow in the
- _cupsImageReadTIFF() function in the "imagetops" filter,
- leading to a heap-based buffer overflow (CVE-2009-0163).</li>
+ _cupsImageReadTIFF() function in the "imagetops" filter,
+ leading to a heap-based buffer overflow (CVE-2009-0163).</li>
<li>Aaron Siegel of Apple Product Security reported that the
- CUPS web interface does not verify the content of the "Host"
- HTTP header properly (CVE-2009-0164).</li>
+ CUPS web interface does not verify the content of the "Host"
+ HTTP header properly (CVE-2009-0164).</li>
<li>Braden Thomas and Drew Yao of Apple Product Security
- reported that CUPS is vulnerable to CVE-2009-0146,
- CVE-2009-0147 and CVE-2009-0166, found earlier in xpdf and
- poppler.</li>
+ reported that CUPS is vulnerable to CVE-2009-0146,
+ CVE-2009-0147 and CVE-2009-0166, found earlier in xpdf and
+ poppler.</li>
</ul>
<p>A remote attacker might send or entice a user to send a
- specially crafted print job to CUPS, possibly resulting in the
- execution of arbitrary code with the privileges of the
- configured CUPS user -- by default this is "lp", or a Denial
- of Service. Furthermore, the web interface could be used to
- conduct DNS rebinding attacks.</p>
+ specially crafted print job to CUPS, possibly resulting in the
+ execution of arbitrary code with the privileges of the
+ configured CUPS user -- by default this is "lp", or a Denial
+ of Service. Furthermore, the web interface could be used to
+ conduct DNS rebinding attacks.</p>
</blockquote>
</body>
</description>
<references>
+ <bid>34571</bid>
+ <bid>34665</bid>
+ <bid>34568</bid>
<cvename>CVE-2009-0163</cvename>
<cvename>CVE-2009-0164</cvename>
<cvename>CVE-2009-0146</cvename>
<cvename>CVE-2009-0147</cvename>
<cvename>CVE-2009-0166</cvename>
- <bid>34571</bid>
- <bid>34665</bid>
- <bid>34568</bid>
<url>http://www.cups.org/articles.php?L582</url>
</references>
<dates>
<discovery>2009-05-05</discovery>
<entry>2009-05-07</entry>
+ <modified>2009-05-13</modified>
</dates>
</vuln>
@@ -180,18 +188,18 @@ Note: Please add new entries to the beginning of this file.
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<h1>Problem Description</h1>
- <p>The function ASN1_STRING_print_ex does not properly validate
- the lengths of BMPString or UniversalString objects before
- attempting to print them.</p>
+ <p>The function ASN1_STRING_print_ex does not properly validate
+ the lengths of BMPString or UniversalString objects before
+ attempting to print them.</p>
<h1>Impact</h1>
- <p>An application which attempts to print a BMPString or
- UniversalString which has an invalid length will crash as a
- result of OpenSSL accessing invalid memory locations. This
- could be used by an attacker to crash a remote application.</p>
+ <p>An application which attempts to print a BMPString or
+ UniversalString which has an invalid length will crash as a
+ result of OpenSSL accessing invalid memory locations. This
+ could be used by an attacker to crash a remote application.</p>
<h1>Workaround</h1>
- <p>No workaround is available, but applications which do not use
- the ASN1_STRING_print_ex function (either directly or
- indirectly) are not affected.</p>
+ <p>No workaround is available, but applications which do not use
+ the ASN1_STRING_print_ex function (either directly or
+ indirectly) are not affected.</p>
</body>
</description>
<references>
@@ -201,6 +209,7 @@ Note: Please add new entries to the beginning of this file.
<dates>
<discovery>2009-03-25</discovery>
<entry>2009-05-07</entry>
+ <modified>2009-05-13</modified>
</dates>
</vuln>
@@ -240,21 +249,21 @@ Note: Please add new entries to the beginning of this file.
<topic>openfire -- Openfire No Password Changes Security Bypass</topic>
<affects>
<package>
- <name>openfire</name>
- <range><lt>3.6.4</lt></range>
+ <name>openfire</name>
+ <range><lt>3.6.4</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Secunia reports:</p>
- <blockquote cite="http://secunia.com/advisories/34984/">
- <p>A vulnerability has been reported in Openfire which can
- be exploited by malicious users to bypass certain security
- restrictions. The vulnerability is caused due to Openfire
- not properly respecting the no password changes setting which
- can be exploited to change passwords by sending jabber:iq:auth
- passwd_change requests to the server.</p>
- </blockquote>
+ <blockquote cite="http://secunia.com/advisories/34984/">
+ <p>A vulnerability has been reported in Openfire which can
+ be exploited by malicious users to bypass certain security
+ restrictions. The vulnerability is caused due to Openfire
+ not properly respecting the no password changes setting which
+ can be exploited to change passwords by sending jabber:iq:auth
+ passwd_change requests to the server.</p>
+ </blockquote>
</body>
</description>
<references>
@@ -265,7 +274,7 @@ Note: Please add new entries to the beginning of this file.
<dates>
<discovery>2009-05-04</discovery>
<entry>2009-05-04</entry>
- <modified>2009-05-04</modified>
+ <modified>2009-05-13</modified>
</dates>
</vuln>