diff options
author | rene <rene@FreeBSD.org> | 2012-02-20 06:14:32 +0800 |
---|---|---|
committer | rene <rene@FreeBSD.org> | 2012-02-20 06:14:32 +0800 |
commit | 07be949893a1f93fc81f08e6c6c66d27026523ef (patch) | |
tree | 895ac4e7b02cd1d9791e114aff41f4d0c9000168 /security | |
parent | eaa294783d6a029783caf0c029efeca8a21140da (diff) | |
download | freebsd-ports-gnome-07be949893a1f93fc81f08e6c6c66d27026523ef.tar.gz freebsd-ports-gnome-07be949893a1f93fc81f08e6c6c66d27026523ef.tar.zst freebsd-ports-gnome-07be949893a1f93fc81f08e6c6c66d27026523ef.zip |
Document a remote code execution via a buffer overflow in PLIB.
Security: CVE-2011-4620
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 42 |
1 files changed, 42 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index c2afe920dd95..7782e9d93350 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -47,6 +47,48 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="ba51c2f7-5b43-11e1-8288-00262d5ed8ee"> + <topic>plib -- remote code execution via buffer overflow</topic> + <affects> + <package> + <name>torcs</name> + <range><lt>1.3.3</lt></range> + </package> + <package> + <name>plib</name> + <range><le>1.8.5</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Secunia reports:</p> + <blockquote cite="http://secunia.com/advisories/47297/"> + <p>A vulnerability has been discovered in PLIB, which can be + exploited by malicious people to compromise an application using + the library.</p> + <p>The vulnerability is caused due to a boundary error within the + "ulSetError()" function (src/util/ulError.cxx) when creating the + error message, which can be exploited to overflow a static + buffer.</p> + <p>Successful exploitation allows the execution of arbitrary code but + requires that the attacker can e.g. control the content of an + overly long error message passed to the "ulSetError()" function.</p> + <p>The vulnerability is confirmed in version 1.8.5. Other versions + may also be affected.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2011-4620</cvename> + <url>http://secunia.com/advisories/47297/</url> + <url>http://torcs.sourceforge.net/index.php?name=News&file=article&sid=79</url> + </references> + <dates> + <discovery>2011-12-21</discovery> + <entry>2012-02-19</entry> + </dates> + </vuln> + <vuln vid="fdd1c316-5a3d-11e1-8d3e-e0cb4e266481"> <topic>phpMyAdmin -- XSS in replication setup</topic> <affects> |