aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authormiwi <miwi@FreeBSD.org>2008-01-20 09:35:00 +0800
committermiwi <miwi@FreeBSD.org>2008-01-20 09:35:00 +0800
commit290860f41b531867352563af37b695c818ea3ac9 (patch)
tree853e83927ca60e0fb57fc877d765552d07c4c063 /security
parent3c34e14634f1b11e980e554a9c7faebf90ed0303 (diff)
downloadfreebsd-ports-gnome-290860f41b531867352563af37b695c818ea3ac9.tar.gz
freebsd-ports-gnome-290860f41b531867352563af37b695c818ea3ac9.tar.zst
freebsd-ports-gnome-290860f41b531867352563af37b695c818ea3ac9.zip
- Fix previous commit (whitespaces, sorting)
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml24
1 files changed, 11 insertions, 13 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 78b0034e66d9..335ad26bc2bf 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -35,7 +35,7 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="e5a9de5f-c6bc-11dc-b9f1-00a0cce0781e">
- <topic> IRC Services-- Denial of Service Vulnerability</topic>
+ <topic>IRC Services-- Denial of Service Vulnerability</topic>
<affects>
<package>
<name>ircservices</name>
@@ -46,28 +46,26 @@ Note: Please add new entries to the beginning of this file.
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Secunia reports:</p>
<blockquote cite="http://secunia.com/advisories/27761">
- <p>A vulnerability has been reported in IRC Services,
- which can be exploited by malicious people to cause
- a DoS (Denial of Service).
-
- The vulnerability is caused due to the improper handling
- of overly long passwords within the "default_encrypt()"
- function in encrypt.c and can be exploited to crash
- an affected server..</p>
+ <p>A vulnerability has been reported in IRC Services,
+ which can be exploited by malicious people to cause
+ a Denial of Service. The vulnerability is caused due
+ to the improper handling of overly long passwords within
+ the "default_encrypt()" function in encrypt.c and can be
+ exploited to crash an affected server.</p>
</blockquote>
</body>
</description>
<references>
- <cvename>CVE-2007-6122</cvename>
- <url>http://secunia.com/advisories/27761</url>
- <url>http://ircservices.za.net/Changes.txt</url>
+ <cvename>CVE-2007-6122</cvename>
+ <url>http://secunia.com/advisories/27761</url>
+ <url>http://ircservices.za.net/Changes.txt</url>
</references>
<dates>
<discovery>2007-11-21</discovery>
<entry>2008-01-19</entry>
</dates>
</vuln>
-
+
<vuln vid="02eedd3c-c6b5-11dc-93b6-000e35248ad7">
<topic>libxine -- buffer overflow vulnerability</topic>
<affects>