diff options
author | trhodes <trhodes@FreeBSD.org> | 2005-06-03 12:48:47 +0800 |
---|---|---|
committer | trhodes <trhodes@FreeBSD.org> | 2005-06-03 12:48:47 +0800 |
commit | 69c4ad7e277cdc0ac33b9f78b5691046cfafa0e9 (patch) | |
tree | 5e51e2a4a65fc0fb08ebe9d5531a2389cb376b41 /security/vuxml | |
parent | 88f13013a69c3a796d6d223a1b3286c14784ed9a (diff) | |
download | freebsd-ports-gnome-69c4ad7e277cdc0ac33b9f78b5691046cfafa0e9.tar.gz freebsd-ports-gnome-69c4ad7e277cdc0ac33b9f78b5691046cfafa0e9.tar.zst freebsd-ports-gnome-69c4ad7e277cdc0ac33b9f78b5691046cfafa0e9.zip |
Buffer overflow in xli.
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 24 |
1 files changed, 24 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index b2c3f8e87ac8..1b2b05f4e359 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,30 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="8c1da77d-d3e9-11d9-8ffb-00061bc2ad93"> + <topic>xli -- buffer overflows</topic> + <affects> + <package> + <name>xli</name> + <range><lt>1.17.0_1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Buffer overflow in xloadimage may allow an attacker + to execute arbitrary commands via a FACES format image.</p> + </body> + </description> + <references> + <cvename>CAN-2001-0775</cvename> + <url>http://www.debian.org/security/2005/dsa-695</url> + </references> + <dates> + <discovery>2000-02-19</discovery> + <entry>2005-06-03</entry> + </dates> + </vuln> + <vuln vid="99b5cfa5-d3d2-11d9-8ffb-00061bc2ad93"> <topic>yamt -- Possible buffer overflow and directory transferal issue</topic> <affects> |