aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authorsimon <simon@FreeBSD.org>2005-08-12 06:18:53 +0800
committersimon <simon@FreeBSD.org>2005-08-12 06:18:53 +0800
commit1ad34af8bb818260c39f106d60a66bcf5f86fcc3 (patch)
tree127cbcfbb49418950b55ac5ca608854e9e30a9e2 /security/vuxml
parent18056e5782fdb7fcd8a0be83a3048b90ced1b6be (diff)
downloadfreebsd-ports-gnome-1ad34af8bb818260c39f106d60a66bcf5f86fcc3.tar.gz
freebsd-ports-gnome-1ad34af8bb818260c39f106d60a66bcf5f86fcc3.tar.zst
freebsd-ports-gnome-1ad34af8bb818260c39f106d60a66bcf5f86fcc3.zip
Document xpdf -- disk fill DoS vulnerability.
Approved by: portmgr (blanket, VuXML)
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml45
1 files changed, 45 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 4d829ea7b112..0298bc63cd38 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,51 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="24eee285-09c7-11da-bc08-0001020eed82">
+ <topic>xpdf -- disk fill DoS vulnerability</topic>
+ <affects>
+ <package>
+ <name>xpdf</name>
+ <range><lt>3.00_7</lt></range>
+ </package>
+ <package>
+ <name>kdegraphics</name>
+ <range><lt>3.4.2</lt></range>
+ </package>
+ <package>
+ <name>pdftohtml</name>
+ <range><lt>0.36_3</lt></range>
+ </package>
+ <package>
+ <name>gpdf</name>
+ <name>cups-base</name>
+ <range><gt>0</gt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>xpdf is vulnerable to a denial of service vulnerability
+ which can cause xpdf to create an infinitely large file,
+ thereby filling up the /tmp partition, when opening a
+ specially crafted PDF file.</p>
+ <p>Note that several applications contains an embedded version
+ on xpdf, therefor making them the vulnerable to the same
+ DoS. In CUPS this vulnerability would cause the pdftops
+ filter to crash.</p>
+ </body>
+ </description>
+ <references>
+ <bid>14529</bid>
+ <cvename>CAN-2005-2097</cvename>
+ <url>http://rhn.redhat.com/errata/RHSA-2005-670.html</url>
+ <url>http://www.kde.org/info/security/advisory-20050809-1.txt</url>
+ </references>
+ <dates>
+ <discovery>2005-08-09</discovery>
+ <entry>2005-08-12</entry>
+ </dates>
+ </vuln>
+
<vuln vid="d7cd5015-08c9-11da-bc08-0001020eed82">
<topic>gforge -- XSS and email flood vulnerabilities</topic>
<affects>