aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorashish <ashish@FreeBSD.org>2011-06-24 21:46:50 +0800
committerashish <ashish@FreeBSD.org>2011-06-24 21:46:50 +0800
commitf305cb35ac32fc0a5779a30b3bf022d231078406 (patch)
treebf4159f5ffe51703701512d037d36524c3ae1d7d /security
parent9672ec1d0930891a2a22d7f35e2dedfd4cac308e (diff)
downloadfreebsd-ports-gnome-f305cb35ac32fc0a5779a30b3bf022d231078406.tar.gz
freebsd-ports-gnome-f305cb35ac32fc0a5779a30b3bf022d231078406.tar.zst
freebsd-ports-gnome-f305cb35ac32fc0a5779a30b3bf022d231078406.zip
- Document ejabberd vulnerability fixed in 2.1.8
PR: ports/158137 Submitted by: Ruslan Mahamatkhanov <cvs-src@yandex.ru> Security: http://vuxml.org/freebsd/01d3ab7d-9c43-11e0-bc0f-0014a5e3cda6.html
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml33
1 files changed, 32 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index b90d9f3032ae..0d1529052add 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,37 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="01d3ab7d-9c43-11e0-bc0f-0014a5e3cda6">
+ <topic>ejabberd -- remote denial of service vulnerability</topic>
+ <affects>
+ <package>
+ <name>ejabberd</name>
+ <range><lt>2.1.7</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>It's reported in CVE advisory that:</p>
+ <blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1753">
+ <p>expat_erl.c in ejabberd before 2.1.7 and 3.x before
+ 3.0.0-alpha-3, and exmpp before 0.9.7, does not properly detect
+ recursion during entity expansion, which allows remote attackers
+ to cause a denial of service (memory and CPU consumption) via a
+ crafted XML document containing a large number of nested entity
+ references, a similar issue to CVE-2003-1564.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2011-1753</cvename>
+ <url>http://www.ejabberd.im/ejabberd-2.1.7</url>
+ </references>
+ <dates>
+ <discovery>2011-04-27</discovery>
+ <entry>2011-06-24</entry>
+ </dates>
+ </vuln>
+
<vuln vid="dfe40cff-9c3f-11e0-9bec-6c626dd55a41">
<topic>mozilla -- multiple vulnerabilities</topic>
<affects>
@@ -146,7 +177,7 @@ Note: Please add new entries to the beginning of this file.
<p>The Piwik 1.5 release addresses a critical security vulnerability,
which affect all Piwik users that have let granted some access to
the "anonymous" user.</p>
- <p>Piwik contains a remotely exploitable vulnerabiliy that could
+ <p>Piwik contains a remotely exploitable vulnerability that could
allow a remote attacker to execute arbitrary code. Only
installations that have granted untrusted view access to their
stats (ie. grant "view" access to a website to anonymous) are at