diff options
author | remko <remko@FreeBSD.org> | 2005-05-22 21:18:12 +0800 |
---|---|---|
committer | remko <remko@FreeBSD.org> | 2005-05-22 21:18:12 +0800 |
commit | 33a234ac7d1b9d90790e1bf06d7125af5d47dd3a (patch) | |
tree | 6abb4381888644dc9ee0480fe88810e0424282fb /security | |
parent | 78d04cfdfb197a4ecdae986f0311ab2b9c347efa (diff) | |
download | freebsd-ports-gnome-33a234ac7d1b9d90790e1bf06d7125af5d47dd3a.tar.gz freebsd-ports-gnome-33a234ac7d1b9d90790e1bf06d7125af5d47dd3a.tar.zst freebsd-ports-gnome-33a234ac7d1b9d90790e1bf06d7125af5d47dd3a.zip |
Document the following issues:
o freeradius -- sql injection and denial of service vulnerability
o ppxp -- local root exploit
o oops -- format string vulnerability
Approved by: simon
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 94 |
1 files changed, 94 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 0c26909fc43c..1af6ecb8cee7 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,100 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="2fbe16c2-cab6-11d9-9aed-000e0c2e438a"> + <topic>freeradius -- sql injection and denial of service vulnerability</topic> + <affects> + <package> + <name>freeradius</name> + <range><le>1.0.2_1</le></range> + </package> + <package> + <name>freeradius-devel</name> + <range><gt>0</gt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>A Gentoo Advisory reports:</p> + <blockquote cite="http://www.gentoo.org/security/en/glsa/glsa-200505-13.xml"> + <p>The FreeRADIUS server is vulnerable to an SQL injection + attack and a buffer overflow, possibly resulting in + disclosure and modification of data and Denial of + Service.</p> + </blockquote> + </body> + </description> + <references> + <bid>13540</bid> + <bid>13541</bid> + <url>http://www.gentoo.org/security/en/glsa/glsa-200505-13.xml</url> + </references> + <dates> + <discovery>2005-05-17</discovery> + <entry>2005-05-22</entry> + </dates> + </vuln> + + <vuln vid="641e8609-cab5-11d9-9aed-000e0c2e438a"> + <topic>ppxp -- local root exploit</topic> + <affects> + <package> + <name>ppxp</name> + <range><gt>0</gt></range> + </package> + <package> + <name>ja-ppxp</name> + <range><gt>0</gt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>A Debian Advisory reports:</p> + <blockquote cite="http://www.debian.org/security/2005/dsa-725"> + <p>Jens Steube discovered that ppxp, yet another PPP program, + does not release root privileges when opening potentially + user supplied log files. This can be tricked into opening + a root shell.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CAN-2005-0392</cvename> + <url>http://www.debian.org/security/2005/dsa-725</url> + </references> + <dates> + <discovery>2005-05-19</discovery> + <entry>2005-05-22</entry> + </dates> + </vuln> + + <vuln vid="1033750f-cab4-11d9-9aed-000e0c2e438a"> + <topic>oops -- format string vulnerability</topic> + <affects> + <package> + <name>oops</name> + <range><le>1.5.24</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>A RST/GHC Advisory reports that there is an format string + vulnerability in oops. The vulnerability can be found in + the MySQL/PgSQL authentication module. Succesful + exploitation may allow execution of arbitrary code.:</p> + </body> + </description> + <references> + <bid>13172</bid> + <cvename>CAN-2005-1121</cvename> + <url>http://rst.void.ru/papers/advisory24.txt</url> + </references> + <dates> + <discovery>2005-04-14</discovery> + <entry>2005-05-22</entry> + </dates> + </vuln> + <vuln vid="d51a7e6e-c546-11d9-9aed-000e0c2e438a"> <topic>cdrdao -- unspecified privilege escalation vulnerability</topic> <affects> |