aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authormiwi <miwi@FreeBSD.org>2008-05-03 04:22:09 +0800
committermiwi <miwi@FreeBSD.org>2008-05-03 04:22:09 +0800
commit93649e0b919be408f269cc1fc44d251eb9c8b229 (patch)
treefaf3e287efb4350023eb4bb30d4ea41c58a72529 /security
parentf1b4da160714b4c95ce5ca431983f4488d149a6e (diff)
downloadfreebsd-ports-gnome-93649e0b919be408f269cc1fc44d251eb9c8b229.tar.gz
freebsd-ports-gnome-93649e0b919be408f269cc1fc44d251eb9c8b229.tar.zst
freebsd-ports-gnome-93649e0b919be408f269cc1fc44d251eb9c8b229.zip
- Document mt-daapd -- Integer overflow
PR: 123285 (based on) Submitted by: Mark D. Foster <mark@foster.cc>
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml33
1 files changed, 33 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 3d6bad0d44b2..a460b4541466 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,39 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="86a4d810-1884-11dd-a914-0016179b2dd5">
+ <topic>mt-daapd -- integer overflow</topic>
+ <affects>
+ <package>
+ <name>mt-daapd</name>
+ <range><lt>0.2.4.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>FrSIRT reports:</p>
+ <blockquote cite="http://www.frsirt.com/english/advisories/2008/1303">
+ <p>A vulnerability has been identified in mt-daapd which could be exploited
+ by remote attackers to cause a denial of service or compromise an
+ affected system. This issue is caused by a buffer overflow error in the
+ ws_getpostvars() function when processing a negative Content-Length:
+ header value, which could be exploited by remote unauthenticated
+ attackers to crash an affected application or execute arbitrary
+ code.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2008-1771</cvename>
+ <url>http://secunia.com/advisories/29917</url>
+ <url>http://www.frsirt.com/english/advisories/2008/1303</url>
+ </references>
+ <dates>
+ <discovery>2008-04-21</discovery>
+ <entry>2008-05-02</entry>
+ </dates>
+ </vuln>
+
<vuln vid="b1bcab7d-1880-11dd-a914-0016179b2dd5">
<topic>sdl_image -- buffer overflow vulnerabilities</topic>
<affects>