diff options
author | remko <remko@FreeBSD.org> | 2005-09-18 03:08:42 +0800 |
---|---|---|
committer | remko <remko@FreeBSD.org> | 2005-09-18 03:08:42 +0800 |
commit | c77d5a06c6a13bb76e2c1605913ed1e8a281251f (patch) | |
tree | a0484a7cecc7149521e12518839dc39259777431 /security | |
parent | 2b77f9487bfb9d674e3be5dfe2e1987062819b2e (diff) | |
download | freebsd-ports-gnome-c77d5a06c6a13bb76e2c1605913ed1e8a281251f.tar.gz freebsd-ports-gnome-c77d5a06c6a13bb76e2c1605913ed1e8a281251f.tar.zst freebsd-ports-gnome-c77d5a06c6a13bb76e2c1605913ed1e8a281251f.zip |
Document the following items:
o apache -- Certificate Revocation List (CRL) off-by-one vulnerability
o squirrelmail -- _$POST variable handling allows for various attacks
Reviewed by: simon
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 60 |
1 files changed, 60 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 29b46a26657e..54ce80597d30 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,66 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="e936d612-253f-11da-bc01-000e0c2e438a"> + <topic>apache -- Certificate Revocation List (CRL) off-by-one vulnerability</topic> + <affects> + <package> + <name>apache</name> + <range><gt>2.*</gt><lt>2.0.54_1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Marc Stern reports an off-by-one vulnerability in within + mod_ssl. The vulnerability lies in mod_ssl's Certificate + Revocation List (CRL). If Apache is configured to use a + CRL this could allow an attacker to crash a child process + causing a Denial of Service.</p> + </body> + </description> + <references> + <bid>14366</bid> + <cvename>CAN-2005-1268</cvename> + </references> + <dates> + <discovery>2005-07-12</discovery> + <entry>2005-09-17</entry> + </dates> + </vuln> + + <vuln vid="7d52081f-2795-11da-bc01-000e0c2e438a"> + <topic>squirrelmail -- _$POST variable handling allows for various + attacks</topic> + <affects> + <package> + <name>squirrelmail</name> + <name>ja-squirrelmail</name> + <range><ge>1.4.0</ge><le>1.4.5</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>A Squirrelmail Advisory reports:</p> + <blockquote cite="http://www.squirrelmail.org/security/issue/2005-07-13"> + <p>An extract($_POST) was done in options_identities.php which + allowed for an attacker to set random variables in that + file. This could lead to the reading (and possible + writing) of other people's preferences, cross site scripting + or writing files in webserver-writable locations.</p> + </blockquote> + </body> + </description> + <references> + <bid>14254</bid> + <cvename>CAN-2005-2095</cvename> + <url>http://www.squirrelmail.org/security/issue/2005-07-13</url> + </references> + <dates> + <discovery>2005-07-13</discovery> + <entry>2005-09-17</entry> + </dates> + </vuln> + <vuln vid="a863aa74-24be-11da-8882-000e0c33c2dc"> <topic>X11 server -- pixmap allocation vulnerability</topic> <affects> |