diff options
-rw-r--r-- | security/vuxml/vuln.xml | 27 |
1 files changed, 27 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 8279c6c0e38e..ad2c40ebd137 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,33 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="402ae710-26a2-11dd-ae05-825f4c35000a"> + <topic>peercast -- arbitrary code execution</topic> + <affects> + <package> + <name>peercast</name> + <range><gt>0</gt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Nico Golde discovered that PeerCast, a P2P audio and + video streaming server, is vulnerable to a buffer overflow + in the HTTP Basic Authentication code, allowing a remote + attacker to crash PeerCast or execure arbitrary code.</p> + </body> + </description> + <references> + <bid>28986</bid> + <cvename>CVE-2008-2040</cvename> + <url>http://secunia.com/advisories/30020</url> + </references> + <dates> + <discovery>2008-05-20</discovery> + <entry>2008-05-21</entry> + </dates> + </vuln> + <vuln vid="f5a76faf-244c-11dd-b143-0211d880e350"> <topic>libvorbis -- various security issues</topic> <affects> |