diff options
author | miwi <miwi@FreeBSD.org> | 2008-05-03 04:22:09 +0800 |
---|---|---|
committer | miwi <miwi@FreeBSD.org> | 2008-05-03 04:22:09 +0800 |
commit | 93649e0b919be408f269cc1fc44d251eb9c8b229 (patch) | |
tree | faf3e287efb4350023eb4bb30d4ea41c58a72529 /security | |
parent | f1b4da160714b4c95ce5ca431983f4488d149a6e (diff) | |
download | freebsd-ports-gnome-93649e0b919be408f269cc1fc44d251eb9c8b229.tar.gz freebsd-ports-gnome-93649e0b919be408f269cc1fc44d251eb9c8b229.tar.zst freebsd-ports-gnome-93649e0b919be408f269cc1fc44d251eb9c8b229.zip |
- Document mt-daapd -- Integer overflow
PR: 123285 (based on)
Submitted by: Mark D. Foster <mark@foster.cc>
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 33 |
1 files changed, 33 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 3d6bad0d44b2..a460b4541466 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,39 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="86a4d810-1884-11dd-a914-0016179b2dd5"> + <topic>mt-daapd -- integer overflow</topic> + <affects> + <package> + <name>mt-daapd</name> + <range><lt>0.2.4.2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>FrSIRT reports:</p> + <blockquote cite="http://www.frsirt.com/english/advisories/2008/1303"> + <p>A vulnerability has been identified in mt-daapd which could be exploited + by remote attackers to cause a denial of service or compromise an + affected system. This issue is caused by a buffer overflow error in the + ws_getpostvars() function when processing a negative Content-Length: + header value, which could be exploited by remote unauthenticated + attackers to crash an affected application or execute arbitrary + code.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2008-1771</cvename> + <url>http://secunia.com/advisories/29917</url> + <url>http://www.frsirt.com/english/advisories/2008/1303</url> + </references> + <dates> + <discovery>2008-04-21</discovery> + <entry>2008-05-02</entry> + </dates> + </vuln> + <vuln vid="b1bcab7d-1880-11dd-a914-0016179b2dd5"> <topic>sdl_image -- buffer overflow vulnerabilities</topic> <affects> |