aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authornectar <nectar@FreeBSD.org>2004-02-16 01:45:06 +0800
committernectar <nectar@FreeBSD.org>2004-02-16 01:45:06 +0800
commitcd1e4827bb2ed22792ee308d061254183cf44709 (patch)
tree2638bfc024ed0afc20ea740950754d74a8e029d6 /security/vuxml
parent05a3fddef4942f38bd18cb6e6e29f0e2257cc0e4 (diff)
downloadfreebsd-ports-gnome-cd1e4827bb2ed22792ee308d061254183cf44709.tar.gz
freebsd-ports-gnome-cd1e4827bb2ed22792ee308d061254183cf44709.tar.zst
freebsd-ports-gnome-cd1e4827bb2ed22792ee308d061254183cf44709.zip
Note buffer overflow in mnoGoSearch.
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml40
1 files changed, 40 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 6a7da82abdd9..1d7e8bd96e8f 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,46 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
"http://www.vuxml.org/dtd/vuxml-1/vuxml-10.dtd">
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="87cc48fd-5fdd-11d8-80e3-0020ed76ef5a">
+ <topic>mnGoSearch buffer overflow in UdmDocToTextBuf()</topic>
+ <affects>
+ <package>
+ <name>mnogosearch</name>
+ <range><le>3.1.20_2</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Jedi/Sector One &lt;j@pureftpd.org&gt; reported the following
+ on the full-disclosure list:</p>
+ <blockquote>
+ <p>Every document is stored in multiple parts according to
+ its sections (description, body, etc) in databases. And
+ when the content has to be sent to the client,
+ UdmDocToTextBuf() concatenates those parts together and
+ skips metadata.</p>
+ <p>Unfortunately, that function lacks bounds checking and
+ a buffer overflow can be triggered by indexing a large
+ enough document.</p>
+ <p>'len' is fixed to 10K [in UdmDocToTextBuf] in searchd.c
+ . S->val length depends on the length of the original
+ document and on the indexer settings (the sample
+ configuration file has low limits that work around the
+ bug, though).</p>
+ <p>Exploitation should be easy, moreover textbuf points to
+ the stack.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://lists.netsys.com/pipermail/full-disclosure/2004-February/017366.html</url>
+ </references>
+ <dates>
+ <discovery>2004-02-15</discovery>
+ <entry>2004-02-15</entry>
+ </dates>
+ </vuln>
+
<vuln vid="cacaffbc-5e64-11d8-80e3-0020ed76ef5a">
<topic>GNU libtool insecure temporary file handling</topic>
<affects>