aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorclement <clement@FreeBSD.org>2004-02-12 02:28:18 +0800
committerclement <clement@FreeBSD.org>2004-02-12 02:28:18 +0800
commitde6616144ae1367b0f14c730699acadf276f8506 (patch)
tree4483e3fba7b0694ac021d9d21c600af8872d4111 /security
parentc725730775ac7488ec6da9f10312af242e2c4b64 (diff)
downloadfreebsd-ports-gnome-de6616144ae1367b0f14c730699acadf276f8506.tar.gz
freebsd-ports-gnome-de6616144ae1367b0f14c730699acadf276f8506.tar.zst
freebsd-ports-gnome-de6616144ae1367b0f14c730699acadf276f8506.zip
Add mutt < 1.4.2 vulnerabilty.
Diffstat (limited to 'security')
-rw-r--r--security/portaudit/database/auditfile.txt1
1 files changed, 1 insertions, 0 deletions
diff --git a/security/portaudit/database/auditfile.txt b/security/portaudit/database/auditfile.txt
index d75ff83ba501..3495703868b5 100644
--- a/security/portaudit/database/auditfile.txt
+++ b/security/portaudit/database/auditfile.txt
@@ -37,3 +37,4 @@ ru-apache+mod_ssl>=1.3<1.3.29|http://www.apacheweek.com/features/security-13|Mul
clamav<0.65_7|http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/62586|remote exploitable DOS vulnerability
apache+ssl>=1.3<1.3.29.1.53|http://www.apache-ssl.org/advisory-20040206.txt|optional client certificate vulnerability
monkey<0.8.2|http://monkeyd.sourceforge.net/|DoS bug caused by get_real_string()
+mutt<1.4.2|http://www.securityfocus.com/archive/1/353428/2004-02-08/2004-02-14/0|buffer overflow that can be triggered by incoming messages