aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authorremko <remko@FreeBSD.org>2005-07-27 23:57:54 +0800
committerremko <remko@FreeBSD.org>2005-07-27 23:57:54 +0800
commitda1aaf63dabd3b1f7fabc0159f0281f2e0669f2e (patch)
treeafb0c0f901604c6cc26cb80327bfc7ca5b1aa242 /security/vuxml
parent37780e05b09a87b63b8efa4a2d085a5f96024d9d (diff)
downloadfreebsd-ports-gnome-da1aaf63dabd3b1f7fabc0159f0281f2e0669f2e.tar.gz
freebsd-ports-gnome-da1aaf63dabd3b1f7fabc0159f0281f2e0669f2e.tar.zst
freebsd-ports-gnome-da1aaf63dabd3b1f7fabc0159f0281f2e0669f2e.zip
Document apache -- http request smuggling.
Requested by: clement Glanced at by: clement
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml64
1 files changed, 64 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index f7c4ea8ccdb5..0aa78a4179d0 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,70 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="651996e0-fe07-11d9-8329-000e0c2e438a">
+ <topic>apache -- http request smuggling</topic>
+ <affects>
+ <package>
+ <name>apache</name>
+ <range><lt>2.0.54_1</lt></range>
+ <range><lt>2.1.6_1</lt></range>
+ </package>
+ <package>
+ <name>apache+ipv6</name>
+ <range><gt>0</gt></range>
+ </package>
+ <package>
+ <name>apache_fp</name>
+ <range><gt>0</gt></range>
+ </package>
+ <package>
+ <name>apache+ssl</name>
+ <range><lt>1.3.33.1.55_1</lt></range>
+ </package>
+ <package>
+ <name>apache+mod_perl</name>
+ <range><lt>1.3.33_3</lt></range>
+ </package>
+ <package>
+ <name>apache+mod_ssl</name>
+ <range><gt>0</gt></range>
+ </package>
+ <package>
+ <name>apache+mod_ssl+ipv6</name>
+ <range><gt>0</gt></range>
+ </package>
+ <package>
+ <name>ru-apache</name>
+ <range><gt>0</gt></range>
+ </package>
+ <package>
+ <name>ru-apache+mod_ssl</name>
+ <range><gt>0</gt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>A Watchfire whitepaper reports an vulnerability in the
+ Apache webserver. The vulnerability can be exploited by
+ malicious people causing cross site scripting, web cache
+ poisoining, session hijacking and most importantly the
+ ability to bypass web application firewall protection.
+ Exploiting this vulnerability requires multiple carefully
+ crafted HTTP requests, taking advantage of an caching server,
+ proxy server, web application firewall etc.</p>
+ </body>
+ </description>
+ <references>
+ <bid>14106</bid>
+ <cvename>CAN-2005-2088</cvename>
+ <url>http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf</url>
+ </references>
+ <dates>
+ <discovery>2005-07-25</discovery>
+ <entry>2005-07-26</entry>
+ </dates>
+ </vuln>
+
<vuln vid="1db7ecf5-fd24-11d9-b4d6-0007e900f87b">
<topic>clamav -- multiple remote buffer overflows</topic>
<affects>