diff options
author | miwi <miwi@FreeBSD.org> | 2008-01-20 09:35:00 +0800 |
---|---|---|
committer | miwi <miwi@FreeBSD.org> | 2008-01-20 09:35:00 +0800 |
commit | 290860f41b531867352563af37b695c818ea3ac9 (patch) | |
tree | 853e83927ca60e0fb57fc877d765552d07c4c063 /security | |
parent | 3c34e14634f1b11e980e554a9c7faebf90ed0303 (diff) | |
download | freebsd-ports-gnome-290860f41b531867352563af37b695c818ea3ac9.tar.gz freebsd-ports-gnome-290860f41b531867352563af37b695c818ea3ac9.tar.zst freebsd-ports-gnome-290860f41b531867352563af37b695c818ea3ac9.zip |
- Fix previous commit (whitespaces, sorting)
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 24 |
1 files changed, 11 insertions, 13 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 78b0034e66d9..335ad26bc2bf 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -35,7 +35,7 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> <vuln vid="e5a9de5f-c6bc-11dc-b9f1-00a0cce0781e"> - <topic> IRC Services-- Denial of Service Vulnerability</topic> + <topic>IRC Services-- Denial of Service Vulnerability</topic> <affects> <package> <name>ircservices</name> @@ -46,28 +46,26 @@ Note: Please add new entries to the beginning of this file. <body xmlns="http://www.w3.org/1999/xhtml"> <p>Secunia reports:</p> <blockquote cite="http://secunia.com/advisories/27761"> - <p>A vulnerability has been reported in IRC Services, - which can be exploited by malicious people to cause - a DoS (Denial of Service). - - The vulnerability is caused due to the improper handling - of overly long passwords within the "default_encrypt()" - function in encrypt.c and can be exploited to crash - an affected server..</p> + <p>A vulnerability has been reported in IRC Services, + which can be exploited by malicious people to cause + a Denial of Service. The vulnerability is caused due + to the improper handling of overly long passwords within + the "default_encrypt()" function in encrypt.c and can be + exploited to crash an affected server.</p> </blockquote> </body> </description> <references> - <cvename>CVE-2007-6122</cvename> - <url>http://secunia.com/advisories/27761</url> - <url>http://ircservices.za.net/Changes.txt</url> + <cvename>CVE-2007-6122</cvename> + <url>http://secunia.com/advisories/27761</url> + <url>http://ircservices.za.net/Changes.txt</url> </references> <dates> <discovery>2007-11-21</discovery> <entry>2008-01-19</entry> </dates> </vuln> - + <vuln vid="02eedd3c-c6b5-11dc-93b6-000e35248ad7"> <topic>libxine -- buffer overflow vulnerability</topic> <affects> |