aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authornectar <nectar@FreeBSD.org>2005-01-25 21:50:43 +0800
committernectar <nectar@FreeBSD.org>2005-01-25 21:50:43 +0800
commitb0cf4a88856ca54dfb93f63de1282c38e63f673d (patch)
tree2fac89c9e30be986715dd5fb1f39594fe9763943 /security
parentbd03c1efd76bcf38f70a1f55dc7e396de804898c (diff)
downloadfreebsd-ports-gnome-b0cf4a88856ca54dfb93f63de1282c38e63f673d.tar.gz
freebsd-ports-gnome-b0cf4a88856ca54dfb93f63de1282c38e63f673d.tar.zst
freebsd-ports-gnome-b0cf4a88856ca54dfb93f63de1282c38e63f673d.zip
Document a vulnerability in zhcon.
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml31
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 17a55ca16f6b..a54e4c1dd72e 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,37 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="d371b627-6ed5-11d9-bd18-000a95bc6fae">
+ <topic>zhcon -- unauthorized file access</topic>
+ <affects>
+ <package>
+ <name>zhcon</name>
+ <name>zh-zhcon</name>
+ <range><lt>0.2.3_3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Martin <q>Joey</q> Schulze reports:</p>
+ <blockquote>
+ <p>Erik Sjöund discovered that zhcon, a fast console CJK
+ system using the Linux framebuffer, accesses a
+ user-controlled configuration file with elevated
+ privileges. Thus, it is possible to read arbitrary files.</p>
+ </blockquote>
+ <p>When installed from the FreeBSD Ports Collection, zhcon is
+ installed set-user-ID root.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CAN-2005-0072</cvename>
+ </references>
+ <dates>
+ <discovery>2005-01-25</discovery>
+ <entry>2005-01-25</entry>
+ </dates>
+ </vuln>
+
<vuln vid="b8943e61-6e68-11d9-a9e7-0001020eed82">
<topic>evolution -- arbitrary code execution vulnerability</topic>
<affects>