diff options
author | nectar <nectar@FreeBSD.org> | 2004-03-17 22:19:37 +0800 |
---|---|---|
committer | nectar <nectar@FreeBSD.org> | 2004-03-17 22:19:37 +0800 |
commit | d41817a3e3c1bd72ba929a677eb5c4c6308eddf1 (patch) | |
tree | e545ec6e19687f2d262a08a1de0fcb92588248f4 /security | |
parent | aa7758e8bf62e45ab3abb3bc36ad20439ec02330 (diff) | |
download | freebsd-ports-gnome-d41817a3e3c1bd72ba929a677eb5c4c6308eddf1.tar.gz freebsd-ports-gnome-d41817a3e3c1bd72ba929a677eb5c4c6308eddf1.tar.zst freebsd-ports-gnome-d41817a3e3c1bd72ba929a677eb5c4c6308eddf1.zip |
Add OpenSSL denial-of-service vulnerability.
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 32 |
1 files changed, 32 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index c7072bde75ca..cc11d2b7d0b8 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,38 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. "http://www.vuxml.org/dtd/vuxml-1/vuxml-10.dtd"> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="68233cba-7774-11d8-89ed-0020ed76ef5a"> + <topic>OpenSSL ChangeCipherSpec denial-of-service vulnerability</topic> + <affects> + <package> + <name>openssl</name> + <name>openssl-beta</name> + <range><lt>0.9.7d</lt></range> + </package> + <system> + <name>FreeBSD</name> + <range><ge>4.0</ge><lt>4.8p17</lt></range> + <range><ge>4.9</ge><lt>4.9p4</lt></range> + <range><ge>5.0</ge><lt>5.1p16</lt></range> + <range><ge>5.2</ge><lt>5.2.1p3</lt></range> + </system> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>A remote attacker could cause an application using OpenSSL to + crash by performing a specially crafted SSL/TLS handshake.</p> + </body> + </description> + <references> + <cvename>CAN-2004-0079</cvename> + <url>http://www.openssl.org/news/secadv_20040317.txt</url> + </references> + <dates> + <discovery>2004-03-17</discovery> + <entry>2004-03-17</entry> + </dates> + </vuln> + <vuln vid="c2e10368-77ab-11d8-b9e8-00e04ccb0a62"> <topic>ModSecurity for Apache 2.x remote off-by-one overflow</topic> <affects> |