diff options
author | garga <garga@FreeBSD.org> | 2006-04-07 18:10:20 +0800 |
---|---|---|
committer | garga <garga@FreeBSD.org> | 2006-04-07 18:10:20 +0800 |
commit | 83a7ebfe4c0901be84a3ce8c36883c708d685210 (patch) | |
tree | 2568245798095a3af9c61b7416023a028099039a /security/zenmap | |
parent | c17a69ed2f17794811dee8ab83e50ecc53b4c197 (diff) | |
download | freebsd-ports-gnome-83a7ebfe4c0901be84a3ce8c36883c708d685210.tar.gz freebsd-ports-gnome-83a7ebfe4c0901be84a3ce8c36883c708d685210.tar.zst freebsd-ports-gnome-83a7ebfe4c0901be84a3ce8c36883c708d685210.zip |
- Update to 20060406 snapshot -- fix multiple vulnerabilities
* CVE-2006-1614
Damian Put discovered an integer overflow in the PE header parser.
This is only exploitable if the ArchiveMaxFileSize option is disabled.
* CVE-2006-1615
Format string vulnerabilities in the logging code have been discovered,
which might lead to the execution of arbitrary code.
* CVE-2006-1630
David Luyer discovered, that ClamAV can be tricked into an invalid
memory access in the cli_bitset_set() function, which may lead to
a denial of service.
- Synchronize with clamav port using SUB_FILES, USE_RC_SUBR
PR: ports/95425
Submitted by: garga
Security: VuXML 6a5174bd-c580-11da-9110-00123ffe8333
Diffstat (limited to 'security/zenmap')
0 files changed, 0 insertions, 0 deletions