diff options
author | nectar <nectar@FreeBSD.org> | 2004-02-20 00:21:38 +0800 |
---|---|---|
committer | nectar <nectar@FreeBSD.org> | 2004-02-20 00:21:38 +0800 |
commit | 99f4f9caf4af1892bb49a6f7002e77e6ec048098 (patch) | |
tree | 1f7728085f544db2a9a003b67daeeb3c195a6cbb /security/vuxml | |
parent | d6390abb85aced4f49b780105012d68cabce9ac7 (diff) | |
download | freebsd-ports-gnome-99f4f9caf4af1892bb49a6f7002e77e6ec048098.tar.gz freebsd-ports-gnome-99f4f9caf4af1892bb49a6f7002e77e6ec048098.tar.zst freebsd-ports-gnome-99f4f9caf4af1892bb49a6f7002e77e6ec048098.zip |
Add a <modified> tag to the XFree86 issue, and move it up to
it's chronological spot within the file.
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 66 |
1 files changed, 34 insertions, 32 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 44cd39447392..5470cde968ef 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -61,6 +61,40 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. <modified>2004-02-19</modified> </dates> </vuln> + + <vuln vid="3837f462-5d6b-11d8-80e3-0020ed76ef5a"> + <topic>Buffer overflows in XFree86 servers</topic> + <affects> + <package> + <name>XFree86-Server</name> + <range><le>4.3.0_13</le></range> + <range><ge>4.3.99</ge><le>4.3.99.15_1</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>A number of buffer overflows were recently discovered in + XFree86, prompted by initial discoveries by iDEFENSE. These + buffer overflows are present in the font alias handling. An + attacker with authenticated access to a running X server may + exploit these vulnerabilities to obtain root privileges on + the machine running the X server.</p> + </body> + </description> + <references> + <url>http://www.idefense.com/application/poi/display?id=72</url> + <url>http://www.idefense.com/application/poi/display?id=73</url> + <cvename>CAN-2004-0083</cvename> + <cvename>CAN-2004-0084</cvename> + <cvename>CAN-2004-0106</cvename> + </references> + <dates> + <discovery>2004-02-10</discovery> + <entry>2004-02-12</entry> + <modified>2004-02-18</modified> + </dates> + </vuln> + <vuln vid="87cc48fd-5fdd-11d8-80e3-0020ed76ef5a"> <topic>mnGoSearch buffer overflow in UdmDocToTextBuf()</topic> <affects> @@ -508,38 +542,6 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. </dates> </vuln> - <vuln vid="3837f462-5d6b-11d8-80e3-0020ed76ef5a"> - <topic>Buffer overflows in XFree86 servers</topic> - <affects> - <package> - <name>XFree86-Server</name> - <range><le>4.3.0_13</le></range> - <range><ge>4.3.99</ge><le>4.3.99.15_1</le></range> - </package> - </affects> - <description> - <body xmlns="http://www.w3.org/1999/xhtml"> - <p>A number of buffer overflows were recently discovered in - XFree86, prompted by initial discoveries by iDEFENSE. These - buffer overflows are present in the font alias handling. An - attacker with authenticated access to a running X server may - exploit these vulnerabilities to obtain root privileges on - the machine running the X server.</p> - </body> - </description> - <references> - <url>http://www.idefense.com/application/poi/display?id=72</url> - <url>http://www.idefense.com/application/poi/display?id=73</url> - <cvename>CAN-2004-0083</cvename> - <cvename>CAN-2004-0084</cvename> - <cvename>CAN-2004-0106</cvename> - </references> - <dates> - <discovery>2004-02-10</discovery> - <entry>2004-02-12</entry> - </dates> - </vuln> - <vuln vid="67c05283-5d62-11d8-80e3-0020ed76ef5a"> <topic>Buffer overflow in Mutt 1.4</topic> <affects> |