aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authoreik <eik@FreeBSD.org>2004-03-12 01:56:35 +0800
committereik <eik@FreeBSD.org>2004-03-12 01:56:35 +0800
commitb01a6412255e04a49bd96d0ee40b836fb9aeed1b (patch)
tree809584075bcbdb8d1afdeb50b5293484f278f185 /security/vuxml
parentbc0fb8c99c4e726c970f27b96dd526f1e5ea7ca6 (diff)
downloadfreebsd-ports-gnome-b01a6412255e04a49bd96d0ee40b836fb9aeed1b.tar.gz
freebsd-ports-gnome-b01a6412255e04a49bd96d0ee40b836fb9aeed1b.tar.zst
freebsd-ports-gnome-b01a6412255e04a49bd96d0ee40b836fb9aeed1b.zip
remove vid 3ca8dd7a-6fb3-11d8-873f-0020ed76ef5a, since the unsafe call
to sprintf is made in preparation for outputting a debug message using OutputDebugString, which is a function from a different operating system. While I'm here, transform U+C3A4 into &auml; (or &#xC3A4;), since CVS is bad in handling binary data.
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml34
1 files changed, 1 insertions, 33 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index d7ad42a2c85e..fb72a3fc7029 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -198,38 +198,6 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
</dates>
</vuln>
- <vuln vid="3ca8dd7a-6fb3-11d8-873f-0020ed76ef5a">
- <topic>Adobe Acrobat Reader XFDF buffer overflow vulnerability</topic>
- <affects>
- <package>
- <name>acroread</name>
- <range><ge>5.0</ge></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>NGSSoftware Insight Security released a security advisory
- detailing a vulnerability in Adobe Acrobat Reader's XFDF
- handling. During the parsing of an XFDF document, `sprintf'
- is used unsafely, resulting in a stack buffer overflow.</p>
- <p>An attacker may create a specially formatted, malicious XFDF
- file that could cause remote code execution. The attacker
- could cause the user into read the XFDF file in a number of
- ways, such as by sending it by email.</p>
- <p><strong>NOTE:</strong> This has not yet been confirmed to
- affect Acrobat Reader versions prior to 5.1, or UNIX versions
- of Acrobat Reader, but it seems likely.</p>
- </body>
- </description>
- <references>
- <url>http://www.ngssoftware.com/advisories/adobexfdf.txt</url>
- </references>
- <dates>
- <discovery>2004-03-03</discovery>
- <entry>2004-03-06</entry>
- </dates>
- </vuln>
-
<vuln vid="8471bb85-6fb0-11d8-873f-0020ed76ef5a">
<topic>GNU Anubis buffer overflows and format string
vulnerabilities</topic>
@@ -241,7 +209,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>Ulf Härnhammar discovered several vulnerabilities in GNU
+ <p>Ulf H&auml;rnhammar discovered several vulnerabilities in GNU
Anubis.</p>
<ul>
<li>Unsafe uses of `sscanf'. The `%s' format specifier is