diff options
author | nectar <nectar@FreeBSD.org> | 2004-04-08 01:13:05 +0800 |
---|---|---|
committer | nectar <nectar@FreeBSD.org> | 2004-04-08 01:13:05 +0800 |
commit | 91b5385125438b8da321f34ea2707f569c15ce2a (patch) | |
tree | 5ff8ec108645d67638d62e29c8d99a356d435d65 /security | |
parent | 499f49f606004692ef7cddf28695d38e00818ae7 (diff) | |
download | freebsd-ports-gnome-91b5385125438b8da321f34ea2707f569c15ce2a.tar.gz freebsd-ports-gnome-91b5385125438b8da321f34ea2707f569c15ce2a.tar.zst freebsd-ports-gnome-91b5385125438b8da321f34ea2707f569c15ce2a.zip |
make tidy
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 179 |
1 files changed, 85 insertions, 94 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 97fefe07cf91..6d63eb8c2176 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -43,9 +43,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. <body xmlns="http://www.w3.org/1999/xhtml"> <p>The kernel interface for creating a snapshot of a filesystem is the same as that for changing the flags on - that filesystem. Due to an oversight, the <a - href="http://www.freebsd.org/cgi/man.cgi?query=mksnap_ffs" - >mksnap_ffs(8)</a> + that filesystem. Due to an oversight, the <a href="http://www.freebsd.org/cgi/man.cgi?query=mksnap_ffs">mksnap_ffs(8)</a> command called that interface with only the snapshot flag set, causing all other flags to be reset to the default value.</p> @@ -90,9 +88,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>A programming error in the <a - href="http://www.freebsd.org/cgi/man.cgi?query=shmat" - >shmat(2)</a> system call can result + <p>A programming error in the <a href="http://www.freebsd.org/cgi/man.cgi?query=shmat">shmat(2)</a> system call can result in a shared memory segment's reference count being erroneously incremented.</p> <p>It may be possible to cause a shared memory segment to @@ -125,9 +121,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>A programming error has been found in the <a - href="http://www.freebsd.org/cgi/man.cgi?query=jail_attach" - >jail_attach(2)</a> + <p>A programming error has been found in the <a href="http://www.freebsd.org/cgi/man.cgi?query=jail_attach">jail_attach(2)</a> system call which affects the way that system call verifies the privilege level of the calling process. Instead of failing immediately if the calling process was already @@ -237,9 +231,88 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. </dates> </vuln> + <vuln vid="6fd02439-5d70-11d8-80e3-0020ed76ef5a"> + <topic>Several remotely exploitable buffer overflows in gaim</topic> + <affects> + <package> + <name>gaim</name> + <range><lt>0.75_3</lt></range> + <range><eq>0.75_5</eq></range> + <range><eq>0.76</eq></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Stefan Esser of e-matters found almost a dozen remotely + exploitable vulnerabilities in Gaim. From the e-matters + advisory:</p> + <blockquote cite="http://security.e-matters.de/advisories/012004.txt"> + <p>While developing a custom add-on, an integer overflow + in the handling of AIM DirectIM packets was revealed that + could lead to a remote compromise of the IM client. After + disclosing this bug to the vendor, they had to make a + hurried release because of a change in the Yahoo connection + procedure that rendered GAIM useless. Unfourtunately at the + same time a closer look onto the sourcecode revealed 11 more + vulnerabilities.</p> + + <p>The 12 identified problems range from simple standard + stack overflows, over heap overflows to an integer overflow + that can be abused to cause a heap overflow. Due to the + nature of instant messaging many of these bugs require + man-in-the-middle attacks between client and server. But the + underlying protocols are easy to implement and MIM attacks + on ordinary TCP sessions is a fairly simple task.</p> + + <p>In combination with the latest kernel vulnerabilities or + the habit of users to work as root/administrator these bugs + can result in remote root compromises.</p> + </blockquote> + </body> + </description> + <references> + <url>http://security.e-matters.de/advisories/012004.txt</url> + <cvename>CAN-2004-0005</cvename> + <cvename>CAN-2004-0006</cvename> + <cvename>CAN-2004-0007</cvename> + <cvename>CAN-2004-0008</cvename> + </references> + <dates> + <discovery>2004-01-26</discovery> + <entry>2004-02-12</entry> + <modified>2004-04-07</modified> + </dates> + </vuln> + + <vuln vid="290d81b9-80f1-11d8-9645-0020ed76ef5a"> + <topic>oftpd denial-of-service vulnerability (PORT command)</topic> + <affects> + <package> + <name>oftpd</name> + <range><lt>0.3.7</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Philippe Oechslin reported a denial-of-service vulnerability + in oftpd. The oftpd server can be crashed by sending a PORT + command containing an integer over 8 bits long (over 255).</p> + </body> + </description> + <references> + <url>http://www.time-travellers.org/oftpd/oftpd-dos.html</url> + <bid>9980</bid> + <cvename>CAN-2004-0376</cvename> + </references> + <dates> + <discovery>2004-03-04</discovery> + <entry>2004-03-28</entry> + <modified>2004-04-05</modified> + </dates> + </vuln> + <vuln vid="322d4ff6-85c3-11d8-a41f-0020ed76ef5a"> - <topic>Midnight Commander buffer overflow during symlink - resolution</topic> + <topic>Midnight Commander buffer overflow during symlink resolution</topic> <affects> <package> <name>mc</name> @@ -577,9 +650,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. <p>From the FreeBSD Security Advisory:</p> <blockquote> <p>A programming error in the handling of some IPv6 socket - options within the <a - href="http://www.freebsd.org/cgi/man.cgi?query=setsockopt" - >setsockopt(2)</a> system call may result + options within the <a href="http://www.freebsd.org/cgi/man.cgi?query=setsockopt">setsockopt(2)</a> system call may result in memory locations being accessed without proper validation.</p> <p>It may be possible for a local attacker to read portions @@ -629,33 +700,6 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. </dates> </vuln> - <vuln vid="290d81b9-80f1-11d8-9645-0020ed76ef5a"> - <topic>oftpd denial-of-service vulnerability (PORT command)</topic> - <affects> - <package> - <name>oftpd</name> - <range><lt>0.3.7</lt></range> - </package> - </affects> - <description> - <body xmlns="http://www.w3.org/1999/xhtml"> - <p>Philippe Oechslin reported a denial-of-service vulnerability - in oftpd. The oftpd server can be crashed by sending a PORT - command containing an integer over 8 bits long (over 255).</p> - </body> - </description> - <references> - <url>http://www.time-travellers.org/oftpd/oftpd-dos.html</url> - <bid>9980</bid> - <cvename>CAN-2004-0376</cvename> - </references> - <dates> - <discovery>2004-03-04</discovery> - <entry>2004-03-28</entry> - <modified>2004-04-05</modified> - </dates> - </vuln> - <vuln vid="cdf18ed9-7f4a-11d8-9645-0020ed76ef5a"> <topic>multiple vulnerabilities in ethereal</topic> <affects> @@ -1965,59 +2009,6 @@ misc.c: </dates> </vuln> - <vuln vid="6fd02439-5d70-11d8-80e3-0020ed76ef5a"> - <topic>Several remotely exploitable buffer overflows in gaim</topic> - <affects> - <package> - <name>gaim</name> - <range><lt>0.75_3</lt></range> - <range><eq>0.75_5</eq></range> - <range><eq>0.76</eq></range> - </package> - </affects> - <description> - <body xmlns="http://www.w3.org/1999/xhtml"> - <p>Stefan Esser of e-matters found almost a dozen remotely - exploitable vulnerabilities in Gaim. From the e-matters - advisory:</p> - <blockquote cite="http://security.e-matters.de/advisories/012004.txt"> - <p>While developing a custom add-on, an integer overflow - in the handling of AIM DirectIM packets was revealed that - could lead to a remote compromise of the IM client. After - disclosing this bug to the vendor, they had to make a - hurried release because of a change in the Yahoo connection - procedure that rendered GAIM useless. Unfourtunately at the - same time a closer look onto the sourcecode revealed 11 more - vulnerabilities.</p> - - <p>The 12 identified problems range from simple standard - stack overflows, over heap overflows to an integer overflow - that can be abused to cause a heap overflow. Due to the - nature of instant messaging many of these bugs require - man-in-the-middle attacks between client and server. But the - underlying protocols are easy to implement and MIM attacks - on ordinary TCP sessions is a fairly simple task.</p> - - <p>In combination with the latest kernel vulnerabilities or - the habit of users to work as root/administrator these bugs - can result in remote root compromises.</p> - </blockquote> - </body> - </description> - <references> - <url>http://security.e-matters.de/advisories/012004.txt</url> - <cvename>CAN-2004-0005</cvename> - <cvename>CAN-2004-0006</cvename> - <cvename>CAN-2004-0007</cvename> - <cvename>CAN-2004-0008</cvename> - </references> - <dates> - <discovery>2004-01-26</discovery> - <entry>2004-02-12</entry> - <modified>2004-04-07</modified> - </dates> - </vuln> - <vuln vid="3388eff9-5d6e-11d8-80e3-0020ed76ef5a"> <topic>Samba 3.0.x password initialization bug</topic> <affects> |