diff options
author | nectar <nectar@FreeBSD.org> | 2004-05-18 22:43:04 +0800 |
---|---|---|
committer | nectar <nectar@FreeBSD.org> | 2004-05-18 22:43:04 +0800 |
commit | 2fe0cfd697940d2c6adfb4ad9b7b0f8e88f9374b (patch) | |
tree | 5bf40e971751252c4c8a39f5e3cda21acdd9c7c9 /security | |
parent | 8e52896f9e050addeb9da1edd0a4652faad8e18c (diff) | |
download | freebsd-ports-gnome-2fe0cfd697940d2c6adfb4ad9b7b0f8e88f9374b.tar.gz freebsd-ports-gnome-2fe0cfd697940d2c6adfb4ad9b7b0f8e88f9374b.tar.zst freebsd-ports-gnome-2fe0cfd697940d2c6adfb4ad9b7b0f8e88f9374b.zip |
make tidy
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 321 |
1 files changed, 160 insertions, 161 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index c9267a4baf73..29f7e4f7504a 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -70,6 +70,101 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. </dates> </vuln> + <vuln vid="2e129846-8fbb-11d8-8b29-0020ed76ef5a"> + <topic>MySQL insecure temporary file creation (mysqlbug)</topic> + <affects> + <package> + <name>mysql-client</name> + <range><ge>4.0</ge><lt>4.0.20</lt></range> + <range><ge>4.1</ge><lt>4.1.0_2</lt></range> + <range><ge>5.0</ge><lt>5.0.0_2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Shaun Colley reports that the script `mysqlbug' included + with MySQL sometimes creates temporary files in an unsafe + manner. As a result, an attacker may create a symlink in + /tmp so that if another user invokes `mysqlbug' and <em>quits + without making <strong>any</strong> changes</em>, an + arbitrary file may be overwritten with the bug report + template.</p> + </body> + </description> + <references> + <url>http://marc.theaimsgroup.com/?l=bugtraq&m=108023246916294&w=2</url> + <url>http://bugs.mysql.com/bug.php?id=3284</url> + <bid>9976</bid> + <cvename>CAN-2004-0381</cvename> + </references> + <dates> + <discovery>2004-03-25</discovery> + <entry>2004-04-16</entry> + <modified>2004-05-18</modified> + </dates> + </vuln> + + <vuln vid="20be2982-4aae-11d8-96f2-0020ed76ef5a"> + <topic>fsp buffer overflow and directory traversal vulnerabilities</topic> + <affects> + <package> + <name>fspd</name> + <range><lt>2.8.1.19</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The <a href="http://www.debian.org/security">Debian + security team</a> reported a pair of vulnerabilities in + fsp:</p> + <blockquote cite="http://www.debian.org/security/2004/dsa-416"> + <p>A vulnerability was discovered in fsp, client utilities + for File Service Protocol (FSP), whereby a remote user could + both escape from the FSP root directory (CAN-2003-1022), and + also overflow a fixed-length buffer to execute arbitrary + code (CAN-2004-0011).</p> + </blockquote> + </body> + </description> + <references> + <cvename>CAN-2003-1022</cvename> + <cvename>CAN-2004-0011</cvename> + <url>http://www.debian.org/security/2004/dsa-416</url> + </references> + <dates> + <discovery>2004-01-06</discovery> + <entry>2004-01-19</entry> + <modified>2004-05-17</modified> + </dates> + </vuln> + + <vuln vid="cb6c6c29-9c4f-11d8-9366-0020ed76ef5a"> + <topic>proftpd IP address access control list breakage</topic> + <affects> + <package> + <name>proftpd</name> + <range><ge>1.2.9</ge><lt>1.2.10.r1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Jindrich Makovicka reports a regression in proftpd's + handling of IP address access control lists (IP ACLs). Due + to this regression, some IP ACLs are treated as ``allow + all''.</p> + </body> + </description> + <references> + <cvename>CAN-2004-0432</cvename> + <url>http://bugs.proftpd.org/show_bug.cgi?id=2267</url> + </references> + <dates> + <discovery>2003-11-04</discovery> + <entry>2004-05-02</entry> + <modified>2004-05-15</modified> + </dates> + </vuln> + <vuln vid="700d43b4-a42a-11d8-9c6d-0020ed76ef5a"> <topic>Cyrus IMSPd multiple vulnerabilities</topic> <affects> @@ -82,8 +177,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. <body xmlns="http://www.w3.org/1999/xhtml"> <p>The Cyrus team reported multiple vulnerabilities in older versions of Cyrus IMSPd:</p> - <blockquote - cite="http://marc.theaimsgroup.com/?l=cyrus-announce&m=107150355226926"> + <blockquote cite="http://marc.theaimsgroup.com/?l=cyrus-announce&m=107150355226926"> <p>These releases correct a recently discovered buffer overflow vulnerability, as well as clean up a significant amount of buffer handling throughout the code.</p> @@ -112,8 +206,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. <description> <body xmlns="http://www.w3.org/1999/xhtml"> <p>In December 2002, Timo Sirainen reported:</p> - <blockquote - cite="http://marc.theaimsgroup.com/?l=bugtraq&m=103886607825605"> + <blockquote cite="http://marc.theaimsgroup.com/?l=bugtraq&m=103886607825605"> <p>Cyrus IMAP server has a a remotely exploitable pre-login buffer overflow. [...] Note that you don't have to log in before exploiting this, and since Cyrus @@ -135,6 +228,33 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. </dates> </vuln> + <vuln vid="fde53204-7ea6-11d8-9645-0020ed76ef5a"> + <topic>insecure temporary file creation in xine-check, xine-bugreport</topic> + <affects> + <package> + <name>xine</name> + <range><lt>0.9.23_3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Some scripts installed with xine create temporary files + insecurely. It is recommended that these scripts (xine-check, + xine-bugreport) not be used. They are not needed for normal + operation.</p> + </body> + </description> + <references> + <url>http://marc.theaimsgroup.com/?l=bugtraq&m=107997911025558</url> + <bid>9939</bid> + </references> + <dates> + <discovery>2004-03-20</discovery> + <entry>2004-03-26</entry> + <modified>2004-05-09</modified> + </dates> + </vuln> + <vuln vid="5f29c2e4-9f6a-11d8-abbc-00e08110b673"> <topic>exim buffer overflow when verify = header_syntax is used</topic> <affects> @@ -163,6 +283,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. <entry>2004-05-06</entry> </dates> </vuln> + <vuln vid="a56a72bb-9f72-11d8-9585-0020ed76ef5a"> <topic>phpBB session table exhaustion</topic> <affects> @@ -547,6 +668,41 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. </dates> </vuln> + <vuln vid="bfb36941-84fa-11d8-a41f-0020ed76ef5a"> + <topic>Incorrect cross-realm trust handling in Heimdal</topic> + <affects> + <package> + <name>heimdal</name> + <range><lt>0.6.1</lt></range> + </package> + <system> + <name>FreeBSD</name> + <range><ge>5.0</ge><lt>5.2_6</lt></range> + <range><ge>4.9</ge><lt>4.9_6</lt></range> + <range><ge>4.0</ge><lt>4.8_19</lt></range> + </system> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Heimdal does not correctly validate the `transited' field of + Kerberos tickets when computing the authentication path. This + could allow a rogue KDC with which cross-realm relationships + have been established to impersonate any KDC in the + authentication path.</p> + </body> + </description> + <references> + <cvename>CAN-2004-0371</cvename> + <freebsdsa>SA-04:08.heimdal</freebsdsa> + <url>http://www.pdc.kth.se/heimdal/advisory/2004-04-01/</url> + </references> + <dates> + <discovery>2004-04-01</discovery> + <entry>2004-04-02</entry> + <modified>2004-05-05</modified> + </dates> + </vuln> + <vuln vid="a2ffb627-9c53-11d8-9366-0020ed76ef5a"> <topic>lha buffer overflows and path traversal issues</topic> <affects> @@ -605,33 +761,6 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. </dates> </vuln> - <vuln vid="cb6c6c29-9c4f-11d8-9366-0020ed76ef5a"> - <topic>proftpd IP address access control list breakage</topic> - <affects> - <package> - <name>proftpd</name> - <range><ge>1.2.9</ge><lt>1.2.10.r1</lt></range> - </package> - </affects> - <description> - <body xmlns="http://www.w3.org/1999/xhtml"> - <p>Jindrich Makovicka reports a regression in proftpd's - handling of IP address access control lists (IP ACLs). Due - to this regression, some IP ACLs are treated as ``allow - all''.</p> - </body> - </description> - <references> - <cvename>CAN-2004-0432</cvename> - <url>http://bugs.proftpd.org/show_bug.cgi?id=2267</url> - </references> - <dates> - <discovery>2003-11-04</discovery> - <entry>2004-05-02</entry> - <modified>2004-05-15</modified> - </dates> - </vuln> - <vuln vid="8338a20f-9573-11d8-9366-0020ed76ef5a"> <topic>xchat remotely exploitable buffer overflow (Socks5)</topic> <affects> @@ -782,40 +911,6 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. </dates> </vuln> - <vuln vid="2e129846-8fbb-11d8-8b29-0020ed76ef5a"> - <topic>MySQL insecure temporary file creation (mysqlbug)</topic> - <affects> - <package> - <name>mysql-client</name> - <range><ge>4.0</ge><lt>4.0.20</lt></range> - <range><ge>4.1</ge><lt>4.1.0_2</lt></range> - <range><ge>5.0</ge><lt>5.0.0_2</lt></range> - </package> - </affects> - <description> - <body xmlns="http://www.w3.org/1999/xhtml"> - <p>Shaun Colley reports that the script `mysqlbug' included - with MySQL sometimes creates temporary files in an unsafe - manner. As a result, an attacker may create a symlink in - /tmp so that if another user invokes `mysqlbug' and <em>quits - without making <strong>any</strong> changes</em>, an - arbitrary file may be overwritten with the bug report - template.</p> - </body> - </description> - <references> - <url>http://marc.theaimsgroup.com/?l=bugtraq&m=108023246916294&w=2</url> - <url>http://bugs.mysql.com/bug.php?id=3284</url> - <bid>9976</bid> - <cvename>CAN-2004-0381</cvename> - </references> - <dates> - <discovery>2004-03-25</discovery> - <entry>2004-04-16</entry> - <modified>2004-05-18</modified> - </dates> - </vuln> - <vuln vid="84237895-8f39-11d8-8b29-0020ed76ef5a"> <topic>neon format string vulnerabilities</topic> <affects> @@ -1245,41 +1340,6 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. </dates> </vuln> - <vuln vid="bfb36941-84fa-11d8-a41f-0020ed76ef5a"> - <topic>Incorrect cross-realm trust handling in Heimdal</topic> - <affects> - <package> - <name>heimdal</name> - <range><lt>0.6.1</lt></range> - </package> - <system> - <name>FreeBSD</name> - <range><ge>5.0</ge><lt>5.2_6</lt></range> - <range><ge>4.9</ge><lt>4.9_6</lt></range> - <range><ge>4.0</ge><lt>4.8_19</lt></range> - </system> - </affects> - <description> - <body xmlns="http://www.w3.org/1999/xhtml"> - <p>Heimdal does not correctly validate the `transited' field of - Kerberos tickets when computing the authentication path. This - could allow a rogue KDC with which cross-realm relationships - have been established to impersonate any KDC in the - authentication path.</p> - </body> - </description> - <references> - <cvename>CAN-2004-0371</cvename> - <freebsdsa>SA-04:08.heimdal</freebsdsa> - <url>http://www.pdc.kth.se/heimdal/advisory/2004-04-01/</url> - </references> - <dates> - <discovery>2004-04-01</discovery> - <entry>2004-04-02</entry> - <modified>2004-05-05</modified> - </dates> - </vuln> - <vuln vid="98bd69c3-834b-11d8-a41f-0020ed76ef5a"> <topic>Courier mail services: remotely exploitable buffer overflows</topic> <affects> @@ -1586,33 +1646,6 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. </dates> </vuln> - <vuln vid="fde53204-7ea6-11d8-9645-0020ed76ef5a"> - <topic>insecure temporary file creation in xine-check, xine-bugreport</topic> - <affects> - <package> - <name>xine</name> - <range><lt>0.9.23_3</lt></range> - </package> - </affects> - <description> - <body xmlns="http://www.w3.org/1999/xhtml"> - <p>Some scripts installed with xine create temporary files - insecurely. It is recommended that these scripts (xine-check, - xine-bugreport) not be used. They are not needed for normal - operation.</p> - </body> - </description> - <references> - <url>http://marc.theaimsgroup.com/?l=bugtraq&m=107997911025558</url> - <bid>9939</bid> - </references> - <dates> - <discovery>2004-03-20</discovery> - <entry>2004-03-26</entry> - <modified>2004-05-09</modified> - </dates> - </vuln> - <vuln vid="c551ae17-7f00-11d8-868e-000347dd607f"> <topic>multiple vulnerabilities in phpBB</topic> <affects> @@ -2915,40 +2948,6 @@ misc.c: </dates> </vuln> - <vuln vid="20be2982-4aae-11d8-96f2-0020ed76ef5a"> - <topic>fsp buffer overflow and directory traversal vulnerabilities</topic> - <affects> - <package> - <name>fspd</name> - <range><lt>2.8.1.19</lt></range> - </package> - </affects> - <description> - <body xmlns="http://www.w3.org/1999/xhtml"> - <p>The <a href="http://www.debian.org/security">Debian - security team</a> reported a pair of vulnerabilities in - fsp:</p> - <blockquote cite="http://www.debian.org/security/2004/dsa-416"> - <p>A vulnerability was discovered in fsp, client utilities - for File Service Protocol (FSP), whereby a remote user could - both escape from the FSP root directory (CAN-2003-1022), and - also overflow a fixed-length buffer to execute arbitrary - code (CAN-2004-0011).</p> - </blockquote> - </body> - </description> - <references> - <cvename>CAN-2003-1022</cvename> - <cvename>CAN-2004-0011</cvename> - <url>http://www.debian.org/security/2004/dsa-416</url> - </references> - <dates> - <discovery>2004-01-06</discovery> - <entry>2004-01-19</entry> - <modified>2004-05-17</modified> - </dates> - </vuln> - <vuln vid="fd376b8b-41e1-11d8-b096-0020ed76ef5a"> <topic>Buffer overflow in INN control message handling</topic> <affects> |