diff options
author | simon <simon@FreeBSD.org> | 2006-01-07 22:56:01 +0800 |
---|---|---|
committer | simon <simon@FreeBSD.org> | 2006-01-07 22:56:01 +0800 |
commit | 69ab38ed3cde3a17d318f0b27a641317fee62577 (patch) | |
tree | 541faf269a8976b0300b795b6bbcc47e7eb0cd9d /security | |
parent | 981f6f7091a35a79c969b750883c230ea086dfa7 (diff) | |
download | freebsd-ports-gnome-69ab38ed3cde3a17d318f0b27a641317fee62577.tar.gz freebsd-ports-gnome-69ab38ed3cde3a17d318f0b27a641317fee62577.tar.zst freebsd-ports-gnome-69ab38ed3cde3a17d318f0b27a641317fee62577.zip |
Document two bogofilter vulnerabilities.
Submitted by: Matthias Andree <matthias.andree@gmx.de>
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 69 |
1 files changed, 69 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 23b4915c31b5..2c563d439372 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,75 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="b747b2a9-7be0-11da-8ec4-0002b3b60e4c"> + <topic>bogofilter -- heap corruption through excessively long words</topic> + <affects> + <package> + <name>bogofilter</name> + <range><ge>0.96.2</ge><lt>0.96.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Matthias Andree reports:</p> + <blockquote cite="http://bogofilter.sourceforge.net/security/bogofilter-SA-2005-02"> + <p>Bogofilter's/bogolexer's input handling in version 0.96.2 was not + keeping track of its output buffers properly and could overrun a + heap buffer if the input contained words whose length exceeded + 16,384 bytes, the size of flex's input buffer. A "word" here refers + to a contiguous run of input octets that was not '_' and did not + match at least one of ispunct(), iscntrl() or isspace().</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2005-4592</cvename> + <url>http://bogofilter.sourceforge.net/security/bogofilter-SA-2005-02</url> + </references> + <dates> + <discovery>2005-10-23</discovery> + <entry>2006-01-07</entry> + </dates> + </vuln> + + <vuln vid="92140bc9-7bde-11da-8ec4-0002b3b60e4c"> + <topic>bogofilter -- heap corruption through malformed input</topic> + <affects> + <package> + <name>bogofilter</name> + <range><ge>0.93.5</ge><lt>0.96.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Matthias Andree reports:</p> + <blockquote cite="http://bogofilter.sourceforge.net/security/bogofilter-SA-2005-01"> + <p>When using Unicode databases (default in more recent bogofilter + installations), upon encountering invalid input sequences, + bogofilter or bogolexer could overrun a malloc()'d buffer, + corrupting the heap, while converting character sets. Bogofilter + would usually be processing untrusted data received from the + network at that time.</p> + + <p>This problem was aggravated by an unrelated bug that made + bogofilter process binary attachments as though they were text, and + attempt charset conversion on them. Given the MIME default + character set, US-ASCII, all input octets in the range 0x80...0xff + were considered invalid input sequences and could trigger the heap + corruption.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2005-4591</cvename> + <url>http://bogofilter.sourceforge.net/security/bogofilter-SA-2005-01</url> + </references> + <dates> + <discovery>2005-10-22</discovery> + <entry>2006-01-07</entry> + </dates> + </vuln> + <vuln vid="c2fdb3bc-7d72-11da-b96e-000fb586ba73"> <topic>rxvt-unicode -- restore permissions on tty devices</topic> <affects> |