diff options
author | wxs <wxs@FreeBSD.org> | 2009-05-22 21:15:21 +0800 |
---|---|---|
committer | wxs <wxs@FreeBSD.org> | 2009-05-22 21:15:21 +0800 |
commit | 400870d8e9ed201c82828323f690a5f858382c34 (patch) | |
tree | 3f78063959cb8c388b7ad9204e5e643ed7bd84ed /security | |
parent | 3d8bf8e0597a55ef4e1b4192fb3752cbcdc05db3 (diff) | |
download | freebsd-ports-gnome-400870d8e9ed201c82828323f690a5f858382c34.tar.gz freebsd-ports-gnome-400870d8e9ed201c82828323f690a5f858382c34.tar.zst freebsd-ports-gnome-400870d8e9ed201c82828323f690a5f858382c34.zip |
- Add CVE information for nsd overflow.
- s/over flow/overflow/ for the same entry.
Submitted by: Eygene Ryabinkin <rea-fbsd@codelabs.ru> (private mail)
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index e38acf6fed40..62c11663ed9a 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -79,7 +79,7 @@ Note: Please add new entries to the beginning of this file. <body xmlns="http://www.w3.org/1999/xhtml"> <p>NLnet Labs:</p> <blockquote cite="http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html"> - <p>A one-byte buffer over flow has been reported in NSD. The + <p>A one-byte buffer overflow has been reported in NSD. The problem affects all versions 2.0.0 to 3.2.1. The bug allows a carefully crafted exploit to bring down your DNS server. It is highly unlikely that this one byte overflow can lead to @@ -88,6 +88,7 @@ Note: Please add new entries to the beginning of this file. </body> </description> <references> + <cvename>CVE-2009-1755</cvename> <url>http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html</url> </references> <dates> |