diff options
author | wxs <wxs@FreeBSD.org> | 2009-01-20 23:20:16 +0800 |
---|---|---|
committer | wxs <wxs@FreeBSD.org> | 2009-01-20 23:20:16 +0800 |
commit | 2a1b1bebccd776cb01985ba18616de927052041d (patch) | |
tree | 17bee08719b20b2131c02727d86e3bca1c1591b5 /security | |
parent | 23fd3be675af8acf228b659ae98d32b619c62be6 (diff) | |
download | freebsd-ports-gnome-2a1b1bebccd776cb01985ba18616de927052041d.tar.gz freebsd-ports-gnome-2a1b1bebccd776cb01985ba18616de927052041d.tar.zst freebsd-ports-gnome-2a1b1bebccd776cb01985ba18616de927052041d.zip |
- Document directory traversal bug in teamspeak server
PR: ports/130608
Submitted by: Mark Foster <mark@foster.cc>
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 29 |
1 files changed, 29 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 925bf39486cc..35bee2167c55 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,35 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="4b68d917-e705-11dd-afcd-00e0815b8da8"> + <topic>Teamspeak Server -- Directory Traversal Vulnerability</topic> + <affects> + <package> + <name>teamspeak_server</name> + <range><le>2.0.23.17</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>SecurityFocus reports:</p> + <blockquote cite="http://www.securityfocus.com/bid/33256"> + <p>TeamSpeak is prone to a directory-traversal vulnerability because + it fails to sufficiently sanitize user-supplied input data. + Exploiting the issue may allow an attacker to obtain sensitive + information that could aid in further attacks.</p> + </blockquote> + </body> + </description> + <references> + <url>http://www.securityfocus.com/bid/33256</url> + <bid>33256</bid> + </references> + <dates> + <discovery>2009-01-14</discovery> + <entry>2009-01-20</entry> + </dates> + </vuln> + <vuln vid="2bc960c4-e665-11dd-afcd-00e0815b8da8"> <topic>optipng -- arbitrary code execution via crafted BMP image</topic> <affects> |