aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorremko <remko@FreeBSD.org>2005-09-18 03:08:42 +0800
committerremko <remko@FreeBSD.org>2005-09-18 03:08:42 +0800
commitc77d5a06c6a13bb76e2c1605913ed1e8a281251f (patch)
treea0484a7cecc7149521e12518839dc39259777431 /security
parent2b77f9487bfb9d674e3be5dfe2e1987062819b2e (diff)
downloadfreebsd-ports-gnome-c77d5a06c6a13bb76e2c1605913ed1e8a281251f.tar.gz
freebsd-ports-gnome-c77d5a06c6a13bb76e2c1605913ed1e8a281251f.tar.zst
freebsd-ports-gnome-c77d5a06c6a13bb76e2c1605913ed1e8a281251f.zip
Document the following items:
o apache -- Certificate Revocation List (CRL) off-by-one vulnerability o squirrelmail -- _$POST variable handling allows for various attacks Reviewed by: simon
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml60
1 files changed, 60 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 29b46a26657e..54ce80597d30 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,66 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="e936d612-253f-11da-bc01-000e0c2e438a">
+ <topic>apache -- Certificate Revocation List (CRL) off-by-one vulnerability</topic>
+ <affects>
+ <package>
+ <name>apache</name>
+ <range><gt>2.*</gt><lt>2.0.54_1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Marc Stern reports an off-by-one vulnerability in within
+ mod_ssl. The vulnerability lies in mod_ssl's Certificate
+ Revocation List (CRL). If Apache is configured to use a
+ CRL this could allow an attacker to crash a child process
+ causing a Denial of Service.</p>
+ </body>
+ </description>
+ <references>
+ <bid>14366</bid>
+ <cvename>CAN-2005-1268</cvename>
+ </references>
+ <dates>
+ <discovery>2005-07-12</discovery>
+ <entry>2005-09-17</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="7d52081f-2795-11da-bc01-000e0c2e438a">
+ <topic>squirrelmail -- _$POST variable handling allows for various
+ attacks</topic>
+ <affects>
+ <package>
+ <name>squirrelmail</name>
+ <name>ja-squirrelmail</name>
+ <range><ge>1.4.0</ge><le>1.4.5</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>A Squirrelmail Advisory reports:</p>
+ <blockquote cite="http://www.squirrelmail.org/security/issue/2005-07-13">
+ <p>An extract($_POST) was done in options_identities.php which
+ allowed for an attacker to set random variables in that
+ file. This could lead to the reading (and possible
+ writing) of other people's preferences, cross site scripting
+ or writing files in webserver-writable locations.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>14254</bid>
+ <cvename>CAN-2005-2095</cvename>
+ <url>http://www.squirrelmail.org/security/issue/2005-07-13</url>
+ </references>
+ <dates>
+ <discovery>2005-07-13</discovery>
+ <entry>2005-09-17</entry>
+ </dates>
+ </vuln>
+
<vuln vid="a863aa74-24be-11da-8882-000e0c33c2dc">
<topic>X11 server -- pixmap allocation vulnerability</topic>
<affects>