diff options
author | simon <simon@FreeBSD.org> | 2005-02-14 07:19:00 +0800 |
---|---|---|
committer | simon <simon@FreeBSD.org> | 2005-02-14 07:19:00 +0800 |
commit | db38f1db4f6118db7b473a0f6589995173998acd (patch) | |
tree | a33111203348185e5f2b76f1e9096b642d1ca8cb /security | |
parent | 7209995b2f1ba74af8c74e37d7bb9bfe7d02f886 (diff) | |
download | freebsd-ports-gnome-db38f1db4f6118db7b473a0f6589995173998acd.tar.gz freebsd-ports-gnome-db38f1db4f6118db7b473a0f6589995173998acd.tar.zst freebsd-ports-gnome-db38f1db4f6118db7b473a0f6589995173998acd.zip |
Document format string vulnerability in the Emacs movemail utility.
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 53 |
1 files changed, 53 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 77f8307b78b5..c874f848559e 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,59 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="3e3c860d-7dae-11d9-a9e7-0001020eed82"> + <topic>emacs -- movemail format string vulnerability</topic> + <affects> + <package> + <name>zh-emacs</name> + <name>emacs</name> + <range><lt>20.7_4</lt></range> + <range><gt>21.*</gt><lt>21.4</lt></range> + </package> + <package> + <name>xemacs</name> + <name>xemacs-mule</name> + <name>zh-xemacs</name> + <name>zh-xemacs-mule</name> + <range><lt>21.4.17</lt></range> + </package> + <package> + <name>xemacs-devel</name> + <range><lt>21.5.b19,1</lt></range> + </package> + <package> + <name>xemacs-devel-21.5</name> + <range><eq>b11</eq></range> + </package> + <package> + <name>xemacs-devel-mule</name> + <range><lt>21.5.b19</lt></range> + </package> + <package> + <name>mule-common</name> + <name>hanemacs</name> + <range><gt>0</gt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Max Vozeler discovered several format string + vulnerabilities in the movemail utility of Emacs. They can + be exploited when connecting to a malicious POP server and + can allow an attacker can execute arbitrary code under the + privileges of the user running Emacs.</p> + </body> + </description> + <references> + <cvename>CAN-2005-0100</cvename> + <bid>12462</bid> + </references> + <dates> + <discovery>2005-01-31</discovery> + <entry>2005-02-14</entry> + </dates> + </vuln> + <vuln vid="bc4a7efa-7d9a-11d9-a9e7-0001020eed82"> <topic>ngircd -- format string vulnerability</topic> <affects> |