diff options
author | beech <beech@FreeBSD.org> | 2008-03-10 10:09:01 +0800 |
---|---|---|
committer | beech <beech@FreeBSD.org> | 2008-03-10 10:09:01 +0800 |
commit | 6aade27b9e2ba53bcc8265d1a507dd167247859e (patch) | |
tree | c743792d61d497176819c31c933066588ed54df9 /security | |
parent | b6e4693db2757e967cceebdc9982377d4a696a44 (diff) | |
download | freebsd-ports-gnome-6aade27b9e2ba53bcc8265d1a507dd167247859e.tar.gz freebsd-ports-gnome-6aade27b9e2ba53bcc8265d1a507dd167247859e.tar.zst freebsd-ports-gnome-6aade27b9e2ba53bcc8265d1a507dd167247859e.zip |
- Add entry for dovecot
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 30 |
1 files changed, 30 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 3fda0c1ca827..6f7155521540 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,36 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="b39bdc06-ee42-11dc-8678-00a0cce0781e"> + <topic>dovecot -- security hole in blocking passdbs </topic> + <affects> + <package> + <name>dovecot</name> + <range><lt>1.0.13</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Dovecot reports:</p> + <blockquote cite="http://dovecot.org/list/dovecot-news/2008-March/000065.html"> + <p>Security hole in blocking passdbs (MySQL always. PAM, passwd + and shadow if blocking=yes) where user could specify extra + fields in the password. The main problem here is when specifying + "skip_password_check" introduced in v1.0.11 for fixing master user + logins, allowing the user to log in as anyone without a valid password. + </p> + </blockquote> + </body> + </description> + <references> + <url>http://dovecot.org/list/dovecot-news/2008-March/000065.html</url> + </references> + <dates> + <discovery>2008-03-09</discovery> + <entry>2008-03-10</entry> + </dates> + </vuln> + <vuln vid="de4d4110-ebce-11dc-ae14-0016179b2dd5"> <topic>mplayer -- multiple vulnerabilities</topic> <affects> |