diff options
author | remko <remko@FreeBSD.org> | 2006-01-02 05:40:15 +0800 |
---|---|---|
committer | remko <remko@FreeBSD.org> | 2006-01-02 05:40:15 +0800 |
commit | 0bd04ca34aeca830c54303689043311d0f3225a1 (patch) | |
tree | b5b12830c3a298ef828565dcfa298fcb86d74dc9 /security | |
parent | afb97a07b4a17ea5d85930a86797b781eb05588a (diff) | |
download | freebsd-ports-gnome-0bd04ca34aeca830c54303689043311d0f3225a1.tar.gz freebsd-ports-gnome-0bd04ca34aeca830c54303689043311d0f3225a1.tar.zst freebsd-ports-gnome-0bd04ca34aeca830c54303689043311d0f3225a1.zip |
Document apache -- mod_imap cross-site scripting flaw.
I expanded the diff from the PR a bit to denote other
affected apache ports as well. Therefor mistakes in
that should be redirected to me.
Also bump the copyright year for the vuxml file.
PR: ports/91157 (based on)
Submitted by: KOMATSU Shinichiro <koma2 at lovepeers dot org>
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 69 |
1 files changed, 68 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 40d9f2997592..eb53d5504f71 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -1,7 +1,7 @@ <?xml version="1.0" encoding="utf-8"?> <!DOCTYPE vuxml PUBLIC "-//vuxml.org//DTD VuXML 1.1//EN" "http://www.vuxml.org/dtd/vuxml-1/vuxml-11.dtd"> <!-- -Copyright 2003-2005 Jacques Vidrine and contributors +Copyright 2003-2006 Jacques Vidrine and contributors Redistribution and use in source (VuXML) and 'compiled' forms (SGML, HTML, PDF, PostScript, RTF and so forth) with or without modification, @@ -34,6 +34,73 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="9fff8dc8-7aa7-11da-bf72-00123f589060"> + <topic>apache -- mod_imap cross-site scripting flaw</topic> + <affects> + <package> + <name>apache</name> + <range><ge>1.3</ge><lt>1.3.34_3</lt></range> + <range><ge>2.0.35</ge><lt>2.0.55_2</lt></range> + <range><ge>2.1</ge><lt>2.1.9_3</lt></range> + <range><ge>2.2</ge><lt>2.2.0_3</lt></range> + </package> + <package> + <name>apache+mod_perl</name> + <range><lt>1.3.34_1</lt></range> + </package> + <package> + <name>apache_fp</name> + <name>apache+ipv6</name> + <name>ru-apache</name> + <name>ru-apache+mod_ssl</name> + <range><ge>0</ge></range> + </package> + <package> + <name>apache+ssl</name> + <range><ge>1.3.0</ge><lt>1.3.33.1.55_2</lt></range> + </package> + <package> + <name>apache+mod_ssl</name> + <name>apache+mod_ssl+ipv6</name> + <name>apache+mod_ssl+mod_accel</name> + <name>apache+mod_ssl+mod_accel+ipv6</name> + <name>apache+mod_ssl+mod_accel+mod_deflate</name> + <name>apache+mod_ssl+mod_accel+mod_deflate+ipv6</name> + <name>apache+mod_ssl+mod_deflate</name> + <name>apache+mod_ssl+mod_deflate+ipv6</name> + <name>apache+mod_ssl+mod_snmp</name> + <name>apache+mod_ssl+mod_snmp+mod_accel</name> + <name>apache+mod_ssl+mod_snmp+mod_accel+ipv6</name> + <name>apache+mod_ssl+mod_snmp+mod_deflate</name> + <name>apache+mod_ssl+mod_snmp+mod_deflate+ipv6</name> + <name>apache+mod_ssl+mod_snmp+mod_accel+mod_deflate+ipv6</name> + <range><lt>1.3.34+2.8.25_1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Apache HTTP Server Project reports:</p> + <blockquote cite="http://httpd.apache.org/security/vulnerabilities_13.html"> + <p>A flaw in mod_imap when using the Referer directive with + image maps. In certain site configurations a remote + attacker could perform a cross-site scripting attack if a + victim can be forced to visit a malicious URL using + certain web browsers.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2005-3352</cvename> + <bid>15834</bid> + <url>http://www.apacheweek.com/features/security-13</url> + <url>http://www.apacheweek.com/features/security-20</url> + </references> + <dates> + <discovery>2005-11-01</discovery> + <entry>2006-01-01</entry> + </dates> + </vuln> + <vuln vid="43770b1c-72f6-11da-8c1d-000e0c2e438a"> <topic>nbd-server -- buffer overflow vulnerability</topic> <affects> |