diff options
author | mnag <mnag@FreeBSD.org> | 2009-08-17 21:26:56 +0800 |
---|---|---|
committer | mnag <mnag@FreeBSD.org> | 2009-08-17 21:26:56 +0800 |
commit | a2e7a7c7af9e6e1344b417078276e3982464eca3 (patch) | |
tree | c2b7cbbadd971b84d43bccb004e1bbfe0e72d753 /security | |
parent | dcebc46a8b833ec2b0da11174d6e03c237be503f (diff) | |
download | freebsd-ports-gnome-a2e7a7c7af9e6e1344b417078276e3982464eca3.tar.gz freebsd-ports-gnome-a2e7a7c7af9e6e1344b417078276e3982464eca3.tar.zst freebsd-ports-gnome-a2e7a7c7af9e6e1344b417078276e3982464eca3.zip |
- memcached -- memcached stats maps Information Disclosure Weakness
PR: 134206
Submitted by: Mark Foster <mark___foster.cc>
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 5be950a27175..5b0d3b0e402c 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,37 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="86ada694-8b30-11de-b9d0-000c6e274733"> + <topic>memcached -- memcached stats maps Information Disclosure Weakness</topic> + <affects> + <package> + <name>memcached</name> + <range><lt>1.2.8</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Secunia reports:</p> + <blockquote cite="http://secunia.com/advisories/34915/"> + <p>A weakness has been reported in memcached, which can be exploited + by malicious people to disclose system information.</p> + <p>The weakness is caused due to the application disclosing the + content of /proc/self/maps if a stats maps command is received. + This can be exploited to disclose e.g. the addresses of allocated + memory regions.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2009-1255</cvename> + <url>http://secunia.com/advisories/34915/</url> + </references> + <dates> + <discovery>2009-04-29</discovery> + <entry>2009-08-17</entry> + </dates> + </vuln> + <vuln vid="2430e9c3-8741-11de-938e-003048590f9e"> <topic>wordpress -- remote admin password reset vulnerability</topic> <affects> |