diff options
author | miwi <miwi@FreeBSD.org> | 2009-02-09 23:31:02 +0800 |
---|---|---|
committer | miwi <miwi@FreeBSD.org> | 2009-02-09 23:31:02 +0800 |
commit | b8ed100096709f40f2eadb58a7540fa7061ab854 (patch) | |
tree | 73a338d8e0dfe9b9de5f5c9d96fd96a1693d7186 /security | |
parent | 1b68005302c39a9eee47483a8b6e40b9921245c9 (diff) | |
download | freebsd-ports-gnome-b8ed100096709f40f2eadb58a7540fa7061ab854.tar.gz freebsd-ports-gnome-b8ed100096709f40f2eadb58a7540fa7061ab854.tar.zst freebsd-ports-gnome-b8ed100096709f40f2eadb58a7540fa7061ab854.zip |
- Document amaya -- multiple buffer overflow vulnerabilities
PR: based on 131508
Submitted by: Mark Foster <mark@foster.cc>
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 42 |
1 files changed, 42 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 70c8ae251ad8..d4daf696dd86 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,48 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="a89b76a7-f6bd-11dd-94d9-0030843d3802"> + <topic>amaya -- multiple buffer overflow vulnerabilities</topic> + <affects> + <package> + <name>amaya</name> + <range><gt>0</gt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Secunia reports:</p> + <blockquote cite="http://secunia.com/advisories/32848/"> + <p>A boundary error when processing "div" HTML tags can be exploited + to cause a stack-based buffer overflow via an overly long "id" + parameter.</p> + <p>A boundary error exists when processing overly long links. This can + be exploited to cause a stack-based buffer overflow by tricking the + user into e.g. editing a malicious link.</p> + <p>A boundary error when processing e.g. a "bdo" HTML tag having an + overly long "dir" attribute can be exploited to cause a stack-based + buffer overflow.</p> + <p>A boundary error when processing "input" HTML tags can be + exploited to cause a stack-based buffer overflow via an overly long + e.g. "type" attribute.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2008-5282</cvename> + <cvename>CVE-2009-0323</cvename> + <url>http://secunia.com/advisories/32848/</url> + <url>http://www.bmgsec.com.au/advisory/41/</url> + <url>http://www.bmgsec.com.au/advisory/40/</url> + <url>http://milw0rm.com/exploits/7467</url> + <url>http://www.coresecurity.com/content/amaya-buffer-overflows</url> + </references> + <dates> + <discovery>2008-11-25</discovery> + <entry>2009-02-09</entry> + </dates> + </vuln> + <vuln vid="71597e3e-f6b8-11dd-94d9-0030843d3802"> <topic>websvn -- multiple vulnerabilities</topic> <affects> |