aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authorremko <remko@FreeBSD.org>2006-01-02 05:40:15 +0800
committerremko <remko@FreeBSD.org>2006-01-02 05:40:15 +0800
commit0bd04ca34aeca830c54303689043311d0f3225a1 (patch)
treeb5b12830c3a298ef828565dcfa298fcb86d74dc9 /security/vuxml
parentafb97a07b4a17ea5d85930a86797b781eb05588a (diff)
downloadfreebsd-ports-gnome-0bd04ca34aeca830c54303689043311d0f3225a1.tar.gz
freebsd-ports-gnome-0bd04ca34aeca830c54303689043311d0f3225a1.tar.zst
freebsd-ports-gnome-0bd04ca34aeca830c54303689043311d0f3225a1.zip
Document apache -- mod_imap cross-site scripting flaw.
I expanded the diff from the PR a bit to denote other affected apache ports as well. Therefor mistakes in that should be redirected to me. Also bump the copyright year for the vuxml file. PR: ports/91157 (based on) Submitted by: KOMATSU Shinichiro <koma2 at lovepeers dot org>
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml69
1 files changed, 68 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 40d9f2997592..eb53d5504f71 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -1,7 +1,7 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE vuxml PUBLIC "-//vuxml.org//DTD VuXML 1.1//EN" "http://www.vuxml.org/dtd/vuxml-1/vuxml-11.dtd">
<!--
-Copyright 2003-2005 Jacques Vidrine and contributors
+Copyright 2003-2006 Jacques Vidrine and contributors
Redistribution and use in source (VuXML) and 'compiled' forms (SGML,
HTML, PDF, PostScript, RTF and so forth) with or without modification,
@@ -34,6 +34,73 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="9fff8dc8-7aa7-11da-bf72-00123f589060">
+ <topic>apache -- mod_imap cross-site scripting flaw</topic>
+ <affects>
+ <package>
+ <name>apache</name>
+ <range><ge>1.3</ge><lt>1.3.34_3</lt></range>
+ <range><ge>2.0.35</ge><lt>2.0.55_2</lt></range>
+ <range><ge>2.1</ge><lt>2.1.9_3</lt></range>
+ <range><ge>2.2</ge><lt>2.2.0_3</lt></range>
+ </package>
+ <package>
+ <name>apache+mod_perl</name>
+ <range><lt>1.3.34_1</lt></range>
+ </package>
+ <package>
+ <name>apache_fp</name>
+ <name>apache+ipv6</name>
+ <name>ru-apache</name>
+ <name>ru-apache+mod_ssl</name>
+ <range><ge>0</ge></range>
+ </package>
+ <package>
+ <name>apache+ssl</name>
+ <range><ge>1.3.0</ge><lt>1.3.33.1.55_2</lt></range>
+ </package>
+ <package>
+ <name>apache+mod_ssl</name>
+ <name>apache+mod_ssl+ipv6</name>
+ <name>apache+mod_ssl+mod_accel</name>
+ <name>apache+mod_ssl+mod_accel+ipv6</name>
+ <name>apache+mod_ssl+mod_accel+mod_deflate</name>
+ <name>apache+mod_ssl+mod_accel+mod_deflate+ipv6</name>
+ <name>apache+mod_ssl+mod_deflate</name>
+ <name>apache+mod_ssl+mod_deflate+ipv6</name>
+ <name>apache+mod_ssl+mod_snmp</name>
+ <name>apache+mod_ssl+mod_snmp+mod_accel</name>
+ <name>apache+mod_ssl+mod_snmp+mod_accel+ipv6</name>
+ <name>apache+mod_ssl+mod_snmp+mod_deflate</name>
+ <name>apache+mod_ssl+mod_snmp+mod_deflate+ipv6</name>
+ <name>apache+mod_ssl+mod_snmp+mod_accel+mod_deflate+ipv6</name>
+ <range><lt>1.3.34+2.8.25_1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Apache HTTP Server Project reports:</p>
+ <blockquote cite="http://httpd.apache.org/security/vulnerabilities_13.html">
+ <p>A flaw in mod_imap when using the Referer directive with
+ image maps. In certain site configurations a remote
+ attacker could perform a cross-site scripting attack if a
+ victim can be forced to visit a malicious URL using
+ certain web browsers.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2005-3352</cvename>
+ <bid>15834</bid>
+ <url>http://www.apacheweek.com/features/security-13</url>
+ <url>http://www.apacheweek.com/features/security-20</url>
+ </references>
+ <dates>
+ <discovery>2005-11-01</discovery>
+ <entry>2006-01-01</entry>
+ </dates>
+ </vuln>
+
<vuln vid="43770b1c-72f6-11da-8c1d-000e0c2e438a">
<topic>nbd-server -- buffer overflow vulnerability</topic>
<affects>