aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authortrhodes <trhodes@FreeBSD.org>2004-06-25 09:35:17 +0800
committertrhodes <trhodes@FreeBSD.org>2004-06-25 09:35:17 +0800
commitfe2521f313435792c33e4a93ac2a0f5eb9ecaf58 (patch)
treeee48195475bea8855387a35a2f5e7d105d889d9d /security
parent81fa18aba03b5c6c5103bfa4e5fa35e33ce205d6 (diff)
downloadfreebsd-ports-gnome-fe2521f313435792c33e4a93ac2a0f5eb9ecaf58.tar.gz
freebsd-ports-gnome-fe2521f313435792c33e4a93ac2a0f5eb9ecaf58.tar.zst
freebsd-ports-gnome-fe2521f313435792c33e4a93ac2a0f5eb9ecaf58.zip
Move the Gallery entry to VuXML.
Diffstat (limited to 'security')
-rw-r--r--security/portaudit-db/database/portaudit.txt1
-rw-r--r--security/vuxml/vuln.xml29
2 files changed, 29 insertions, 1 deletions
diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt
index 8ec9317eb162..aaebb2352286 100644
--- a/security/portaudit-db/database/portaudit.txt
+++ b/security/portaudit-db/database/portaudit.txt
@@ -3,7 +3,6 @@
apache>=2.*<2.0.49_1|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0488|mod_ssl stack-based buffer overflow|662cd99e-bc9d-11d8-916c-000347dd607f
apache+mod_ssl*<1.3.31+2.8.18|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0488|mod_ssl stack-based buffer overflow|662cd99e-bc9d-11d8-916c-000347dd607f
ru-apache+mod_ssl<1.3.31+30.20+2.8.18|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0488|mod_ssl stack-based buffer overflow|662cd99e-bc9d-11d8-916c-000347dd607f
-gallery<1.4.3.2|http://secunia.com/advisories/11752 http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=123|Gallery user authentication bypass vulnerability|253ea131-bd12-11d8-b071-00e08110b673
apache<1.3.31_1|http://www.apacheweek.com/features/security-13|mod_proxy buffer overflow (CAN-2004-0492)|5bcd500c-bc9d-11d8-916c-000347dd607f
apache+mod_ssl*<1.3.31+2.8.18_4|http://www.apacheweek.com/features/security-13|mod_proxy buffer overflow (CAN-2004-0492)|5bcd500c-bc9d-11d8-916c-000347dd607f
ru-apache+mod_ssl<=1.3.31+30.20+2.8.18|http://www.apacheweek.com/features/security-13|mod_proxy buffer overflow (CAN-2004-0492)|5bcd500c-bc9d-11d8-916c-000347dd607f
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 48a99cb92b9b..882efe8feb78 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,35 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="253ea131-bd12-11d8-b071-00e08110b673">
+ <topic>Gallery 1.4.3 and ealier user authentication bypass</topic>
+ <affects>
+ <package>
+ <name>gallery</name>
+ <range><lt>1.4.3.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>A flaw exists in Gallery versions previous to
+ 1.4.3-pl1 and post 1.2 which may give an attacker
+ the potential to log in under the "admin" account.
+ Data outside of the gallery is unaffected and the
+ attacker cannot modify any data other than the
+ photos or photo albums.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CAN-2004-0522</cvename>
+ <url>http://gallery.menalto.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=123</url>
+ <url>http://secunia.com/advisories/11752</url>
+ </references>
+ <dates>
+ <discovery>2004-06-01</discovery>
+ <entry>TO BE FILLED BEFORE COMMIT</entry>
+ </dates>
+ </vuln>
+
<vuln vid="6f955451-ba54-11d8-b88c-000d610a3b12">
<topic>Buffer overflow in Squid NTLM authentication helper</topic>
<affects>