aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authorVsevolod Stakhov <vsevolod@FreeBSD.org>2005-07-30 18:00:41 +0800
committerVsevolod Stakhov <vsevolod@FreeBSD.org>2005-07-30 18:00:41 +0800
commitc2cb81e45a6ab6582d120e8f213d217ef10be7c9 (patch)
treed07c80cc92683effe52367c5c6e283aa8ec497ac /security/vuxml
parent5c5ec9a23d6a9900ade8d713b225e4f33811519a (diff)
downloadfreebsd-ports-gnome-c2cb81e45a6ab6582d120e8f213d217ef10be7c9.tar.gz
freebsd-ports-gnome-c2cb81e45a6ab6582d120e8f213d217ef10be7c9.tar.zst
freebsd-ports-gnome-c2cb81e45a6ab6582d120e8f213d217ef10be7c9.zip
Document jabberd vulnerabilities that were fixed by the latest update.
Approved by: perky (mentor)
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml37
1 files changed, 37 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 1bb03baffa8b..8783f40543bb 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -19514,4 +19514,41 @@ misc.c:
<entry>2005-05-19</entry>
</dates>
</vuln>
+ <vuln vid="55041d37-ff62-11d9-a9a5-000ae4641456">
+ <topic>3 buffer overflows in jabberd</topic>
+ <affects>
+ <package>
+ <name>jabberd</name>
+ <range><lt>2.0.9</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>
+ There are 3 buffer overflows in jid.c that are triggered during
+ parsing of JID strings when components (user, host or resource)
+ are too long. </p>
+ <p>
+ 1). jid.c, line 103: overflow in `str' buffer through strcpy()
+ when "user" part is too long.</p>
+ <p>
+ 2). jid.c, line 115: overflow in `str' buffer through strcpy()
+ when "host" part is too long.</p>
+ <p>
+ 3). jid.c, line 127: overflow in `str' buffer through strcpy()
+ when "resource" part is too long.</p>
+ <p>
+ These overflows can be used to perform a DoS attack on the server
+ (sm process segfaults) and can possible be used for arbitrary code
+ execution.</p>
+ </body>
+ </description>
+ <references>
+ <url>http://j2.openaether.org/bugzilla/show_bug.cgi?id=99</url>
+ </references>
+ <dates>
+ <discovery>2005-07-25</discovery>
+ <entry>2005-07-28</entry>
+ </dates>
+ </vuln>
</vuxml>