aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--security/vuxml/vuln.xml37
1 files changed, 37 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index da57b2776139..de2a97a25336 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,43 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="c28f4705-043f-11da-bc08-0001020eed82">
+ <topic>proftpd -- format string vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>proftpd</name>
+ <name>proftpd-mysql</name>
+ <range><lt>1.3.0.rc2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The ProFTPD release notes states:</p>
+ <blockquote cite="http://www.proftpd.org/docs/RELEASE_NOTES-1.3.0rc2">
+ <p>sean &lt;infamous42md at hotpop.com&gt; found two format
+ string vulnerabilities, one in mod_sql's SQLShowInfo
+ directive, and one involving the 'ftpshut' utility. Both
+ can be considered low risk, as they require active
+ involvement on the part of the site administrator in order
+ to be exploited.</p>
+ </blockquote>
+ <p>These vulnerabilities could potentially lead to information
+ disclosure, a denial-of-server situation, or execution of
+ arbitrary code with the permissions of the user running
+ ProFTPD.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CAN-2005-2390</cvename>
+ <url>http://www.gentoo.org/security/en/glsa/glsa-200508-02.xml</url>
+ <url>http://www.proftpd.org/docs/RELEASE_NOTES-1.3.0rc2</url>
+ </references>
+ <dates>
+ <discovery>2005-07-26</discovery>
+ <entry>2005-08-03</entry>
+ </dates>
+ </vuln>
+
<vuln vid="debbb39c-fdb3-11d9-a30d-00b0d09acbfc">
<topic>nbsmtp -- format string vulnerability</topic>
<affects>