aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorrene <rene@FreeBSD.org>2012-02-20 06:14:32 +0800
committerrene <rene@FreeBSD.org>2012-02-20 06:14:32 +0800
commit07be949893a1f93fc81f08e6c6c66d27026523ef (patch)
tree895ac4e7b02cd1d9791e114aff41f4d0c9000168 /security
parenteaa294783d6a029783caf0c029efeca8a21140da (diff)
downloadfreebsd-ports-gnome-07be949893a1f93fc81f08e6c6c66d27026523ef.tar.gz
freebsd-ports-gnome-07be949893a1f93fc81f08e6c6c66d27026523ef.tar.zst
freebsd-ports-gnome-07be949893a1f93fc81f08e6c6c66d27026523ef.zip
Document a remote code execution via a buffer overflow in PLIB.
Security: CVE-2011-4620
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml42
1 files changed, 42 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index c2afe920dd95..7782e9d93350 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -47,6 +47,48 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="ba51c2f7-5b43-11e1-8288-00262d5ed8ee">
+ <topic>plib -- remote code execution via buffer overflow</topic>
+ <affects>
+ <package>
+ <name>torcs</name>
+ <range><lt>1.3.3</lt></range>
+ </package>
+ <package>
+ <name>plib</name>
+ <range><le>1.8.5</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Secunia reports:</p>
+ <blockquote cite="http://secunia.com/advisories/47297/">
+ <p>A vulnerability has been discovered in PLIB, which can be
+ exploited by malicious people to compromise an application using
+ the library.</p>
+ <p>The vulnerability is caused due to a boundary error within the
+ "ulSetError()" function (src/util/ulError.cxx) when creating the
+ error message, which can be exploited to overflow a static
+ buffer.</p>
+ <p>Successful exploitation allows the execution of arbitrary code but
+ requires that the attacker can e.g. control the content of an
+ overly long error message passed to the "ulSetError()" function.</p>
+ <p>The vulnerability is confirmed in version 1.8.5. Other versions
+ may also be affected.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2011-4620</cvename>
+ <url>http://secunia.com/advisories/47297/</url>
+ <url>http://torcs.sourceforge.net/index.php?name=News&amp;file=article&amp;sid=79</url>
+ </references>
+ <dates>
+ <discovery>2011-12-21</discovery>
+ <entry>2012-02-19</entry>
+ </dates>
+ </vuln>
+
<vuln vid="fdd1c316-5a3d-11e1-8d3e-e0cb4e266481">
<topic>phpMyAdmin -- XSS in replication setup</topic>
<affects>