aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authormiwi <miwi@FreeBSD.org>2008-12-26 00:41:54 +0800
committermiwi <miwi@FreeBSD.org>2008-12-26 00:41:54 +0800
commitc20940600dd86293d6542ac476d398a8aaa918fd (patch)
tree606500cd9577c2ad9b8b25d4d33e260661f95ce4 /security
parent960b983747cef6d281efb001f2b5e8c6da5bd0f8 (diff)
downloadfreebsd-ports-gnome-c20940600dd86293d6542ac476d398a8aaa918fd.tar.gz
freebsd-ports-gnome-c20940600dd86293d6542ac476d398a8aaa918fd.tar.zst
freebsd-ports-gnome-c20940600dd86293d6542ac476d398a8aaa918fd.zip
- Small cleanup for the last cups-base entry
* CVE-2008-5184 was fixed in 1.3.8. * CVE-2008-1722 does not related to anything in this entry; * PNG buffer overflow is really CVE-2008-5286. Reported by: Eygene Ryabinkin <rea-fbsd@codelabs.ru> No Cookies for: miwi
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml23
1 files changed, 10 insertions, 13 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 031426922f8e..460e82c27a94 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -790,7 +790,7 @@ Note: Please add new entries to the beginning of this file.
</vuln>
<vuln vid="87106b67-be13-11dd-a578-0030843d3802">
- <topic>cups -- multiple vulnerabilities</topic>
+ <topic>cups -- potential buffer overflow in PNG reading code</topic>
<affects>
<package>
<name>cups-base</name>
@@ -799,27 +799,24 @@ Note: Please add new entries to the beginning of this file.
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>The cups reports:</p>
- <blockquote cite="http://www.cups.org/str.php?L2974">
- <p>The PNG image reading code did not validate the image size
- properly, leading to a potential buffer overflow (STR #2974)</p>
- <p>The web interface (cgi-bin/admin.c) in CUPS uses the
- guest username when a user is not logged on to the web server, which
- makes it easier for remote attackers to bypass intended policy and
- conduct CSRF attacks via the (1) add and (2) cancel RSS subscription
- functions.</p>
+ <p>CUPS reports:</p>
+ <blockquote cite="http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt">
+ <p>The PNG image reading code did not validate the
+ image size properly, leading to a potential buffer overflow
+ (STR #2974)</p>
</blockquote>
</body>
</description>
<references>
- <cvename>CVE-2008-1722</cvename>
- <cvename>CVE-2008-5184</cvename>
- <url>http://secunia.com/advisories/30190</url>
+ <cvename>CVE-2008-5286</cvename>
<url>http://www.cups.org/str.php?L2974</url>
+ <url>http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt</url>
+ <url>http://www.openwall.com/lists/oss-security/2008/11/25/2</url>
</references>
<dates>
<discovery>2008-10-17</discovery>
<entry>2008-11-29</entry>
+ <modified>2008-12-25</modified>
</dates>
</vuln>