aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authornectar <nectar@FreeBSD.org>2004-02-20 00:21:38 +0800
committernectar <nectar@FreeBSD.org>2004-02-20 00:21:38 +0800
commit99f4f9caf4af1892bb49a6f7002e77e6ec048098 (patch)
tree1f7728085f544db2a9a003b67daeeb3c195a6cbb /security/vuxml
parentd6390abb85aced4f49b780105012d68cabce9ac7 (diff)
downloadfreebsd-ports-gnome-99f4f9caf4af1892bb49a6f7002e77e6ec048098.tar.gz
freebsd-ports-gnome-99f4f9caf4af1892bb49a6f7002e77e6ec048098.tar.zst
freebsd-ports-gnome-99f4f9caf4af1892bb49a6f7002e77e6ec048098.zip
Add a <modified> tag to the XFree86 issue, and move it up to
it's chronological spot within the file.
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml66
1 files changed, 34 insertions, 32 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 44cd39447392..5470cde968ef 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -61,6 +61,40 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
<modified>2004-02-19</modified>
</dates>
</vuln>
+
+ <vuln vid="3837f462-5d6b-11d8-80e3-0020ed76ef5a">
+ <topic>Buffer overflows in XFree86 servers</topic>
+ <affects>
+ <package>
+ <name>XFree86-Server</name>
+ <range><le>4.3.0_13</le></range>
+ <range><ge>4.3.99</ge><le>4.3.99.15_1</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>A number of buffer overflows were recently discovered in
+ XFree86, prompted by initial discoveries by iDEFENSE. These
+ buffer overflows are present in the font alias handling. An
+ attacker with authenticated access to a running X server may
+ exploit these vulnerabilities to obtain root privileges on
+ the machine running the X server.</p>
+ </body>
+ </description>
+ <references>
+ <url>http://www.idefense.com/application/poi/display?id=72</url>
+ <url>http://www.idefense.com/application/poi/display?id=73</url>
+ <cvename>CAN-2004-0083</cvename>
+ <cvename>CAN-2004-0084</cvename>
+ <cvename>CAN-2004-0106</cvename>
+ </references>
+ <dates>
+ <discovery>2004-02-10</discovery>
+ <entry>2004-02-12</entry>
+ <modified>2004-02-18</modified>
+ </dates>
+ </vuln>
+
<vuln vid="87cc48fd-5fdd-11d8-80e3-0020ed76ef5a">
<topic>mnGoSearch buffer overflow in UdmDocToTextBuf()</topic>
<affects>
@@ -508,38 +542,6 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
</dates>
</vuln>
- <vuln vid="3837f462-5d6b-11d8-80e3-0020ed76ef5a">
- <topic>Buffer overflows in XFree86 servers</topic>
- <affects>
- <package>
- <name>XFree86-Server</name>
- <range><le>4.3.0_13</le></range>
- <range><ge>4.3.99</ge><le>4.3.99.15_1</le></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>A number of buffer overflows were recently discovered in
- XFree86, prompted by initial discoveries by iDEFENSE. These
- buffer overflows are present in the font alias handling. An
- attacker with authenticated access to a running X server may
- exploit these vulnerabilities to obtain root privileges on
- the machine running the X server.</p>
- </body>
- </description>
- <references>
- <url>http://www.idefense.com/application/poi/display?id=72</url>
- <url>http://www.idefense.com/application/poi/display?id=73</url>
- <cvename>CAN-2004-0083</cvename>
- <cvename>CAN-2004-0084</cvename>
- <cvename>CAN-2004-0106</cvename>
- </references>
- <dates>
- <discovery>2004-02-10</discovery>
- <entry>2004-02-12</entry>
- </dates>
- </vuln>
-
<vuln vid="67c05283-5d62-11d8-80e3-0020ed76ef5a">
<topic>Buffer overflow in Mutt 1.4</topic>
<affects>