diff options
author | nectar <nectar@FreeBSD.org> | 2004-09-21 04:13:11 +0800 |
---|---|---|
committer | nectar <nectar@FreeBSD.org> | 2004-09-21 04:13:11 +0800 |
commit | ea3e03dd42f55e8c0ec3f080ac6f37c96d995331 (patch) | |
tree | 95d8b61a4fc3e2c36cc08f2c3d39b144574d4c33 /security | |
parent | 3d5b77526c220cda2e3f67c75ef6eb320c112730 (diff) | |
download | freebsd-ports-gnome-ea3e03dd42f55e8c0ec3f080ac6f37c96d995331.tar.gz freebsd-ports-gnome-ea3e03dd42f55e8c0ec3f080ac6f37c96d995331.tar.zst freebsd-ports-gnome-ea3e03dd42f55e8c0ec3f080ac6f37c96d995331.zip |
Add entry describe GNU Radius denial-of-service vulnerability.
Approved by: portmgr
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 36 |
1 files changed, 36 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 80d23aab87e2..487f10e992ea 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,42 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="e6f0edd8-0b40-11d9-8a8a-000c41e2cdad"> + <topic>gnu-radius --- SNMP-related denial-of-service</topic> + <affects> + <package> + <name>gnu-radius</name> + <range><ge>0</ge></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>An iDEFENSE security advisory reports:</p> + <blockquote + cite="http://www.idefense.com/application/poi/display?id=141&type=vulnerabilities"> + <p>Remote exploitation of an input validation error in + version 1.2 of GNU radiusd could allow a denial of + service.</p> + <p>The vulnerability specifically exists within + the asn_decode_string() function defined in + snmplib/asn1.c. When a very large unsigned number is + supplied, it is possible that an integer overflow will + occur in the bounds-checking code. The daemon will then + attempt to reference unallocated memory, resulting in an + access violation that causes the process to terminate.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CAN-2004-0849</cvename> + <url>http://www.idefense.com/application/poi/display?id=141&type=vulnerabilities</url> + </references> + <dates> + <discovery>2004-09-15</discovery> + <entry>2004-09-20</entry> + </dates> + </vuln> + <vuln vid="a268ef4a-0b35-11d9-8a8a-000c41e2cdad"> <topic>sudo --- sudoedit information disclosure</topic> <affects> |