diff options
author | clement <clement@FreeBSD.org> | 2004-02-12 02:28:18 +0800 |
---|---|---|
committer | clement <clement@FreeBSD.org> | 2004-02-12 02:28:18 +0800 |
commit | de6616144ae1367b0f14c730699acadf276f8506 (patch) | |
tree | 4483e3fba7b0694ac021d9d21c600af8872d4111 /security | |
parent | c725730775ac7488ec6da9f10312af242e2c4b64 (diff) | |
download | freebsd-ports-gnome-de6616144ae1367b0f14c730699acadf276f8506.tar.gz freebsd-ports-gnome-de6616144ae1367b0f14c730699acadf276f8506.tar.zst freebsd-ports-gnome-de6616144ae1367b0f14c730699acadf276f8506.zip |
Add mutt < 1.4.2 vulnerabilty.
Diffstat (limited to 'security')
-rw-r--r-- | security/portaudit/database/auditfile.txt | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/security/portaudit/database/auditfile.txt b/security/portaudit/database/auditfile.txt index d75ff83ba501..3495703868b5 100644 --- a/security/portaudit/database/auditfile.txt +++ b/security/portaudit/database/auditfile.txt @@ -37,3 +37,4 @@ ru-apache+mod_ssl>=1.3<1.3.29|http://www.apacheweek.com/features/security-13|Mul clamav<0.65_7|http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/62586|remote exploitable DOS vulnerability apache+ssl>=1.3<1.3.29.1.53|http://www.apache-ssl.org/advisory-20040206.txt|optional client certificate vulnerability monkey<0.8.2|http://monkeyd.sourceforge.net/|DoS bug caused by get_real_string() +mutt<1.4.2|http://www.securityfocus.com/archive/1/353428/2004-02-08/2004-02-14/0|buffer overflow that can be triggered by incoming messages |