diff options
author | simon <simon@FreeBSD.org> | 2005-07-31 23:00:54 +0800 |
---|---|---|
committer | simon <simon@FreeBSD.org> | 2005-07-31 23:00:54 +0800 |
commit | ad7580f17c081de1e29852049678839887df77a8 (patch) | |
tree | 38842e23f567e48e2ab1782587b3fd45766f4270 /security | |
parent | 00a4861f650deddd7a4884ab17d36ab726eeb510 (diff) | |
download | freebsd-ports-gnome-ad7580f17c081de1e29852049678839887df77a8.tar.gz freebsd-ports-gnome-ad7580f17c081de1e29852049678839887df77a8.tar.zst freebsd-ports-gnome-ad7580f17c081de1e29852049678839887df77a8.zip |
Document sylpheed -- MIME-encoded file name buffer overflow
vulnerability.
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 0985e6816d90..c1da797212f6 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,37 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="b1e8c810-01d0-11da-bc08-0001020eed82"> + <topic>sylpheed -- MIME-encoded file name buffer overflow + vulnerability</topic> + <affects> + <package> + <name>sylpheed</name> + <name>sylpheed-gtk2</name> + <name>sylpheed-claws</name> + <range><lt>1.0.4</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Sylpheed is vulnerable to a buffer overflow when displaying + emails with attachments that have MIME-encoded file names. + This could be used by a remote attacker to crash sylpheed + potentially allowing execution of arbitrary code with the + permissions of the user running sylpheed.</p> + </body> + </description> + <references> + <bid>12934</bid> + <cvename>CAN-2005-0926</cvename> + <url>http://sylpheed.good-day.net/changelog.html.en</url> + </references> + <dates> + <discovery>2005-03-29</discovery> + <entry>2005-07-31</entry> + </dates> + </vuln> + <vuln vid="58247a96-01c8-11da-bc08-0001020eed82"> <topic>phpmyadmin -- cross site scripting vulnerability</topic> <affects> |