From c269ba0b1f866b541e9f01ffb38ede1e3cf64d38 Mon Sep 17 00:00:00 2001 From: simon Date: Sun, 13 Feb 2005 09:59:02 +0000 Subject: - Fix a cvename that should have been a certvu. - Delete trailing white space. - Fix some nearby formatting while I'm here anyway. --- security/vuxml/vuln.xml | 29 ++++++++++++++++------------- 1 file changed, 16 insertions(+), 13 deletions(-) (limited to 'security') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 787489c15353..262a812af90d 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -412,7 +412,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. when the mode is not restrictive enough. In addition, the output directory is created with world writable permissions allowing other users to drop symlinks or other files at that location.

- + http://people.freebsd.org/~niels/issues/newsgrab-20050114.txt @@ -424,6 +424,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 2005-02-01 + newsgrab -- directory traversal vulnerability @@ -441,7 +442,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. could cause newsgrab to drop an attachment anywhere on the file system using the permissions of the user running the script.

- + http://people.freebsd.org/~niels/issues/newsgrab-20050114.txt @@ -471,7 +472,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. overflow by sending an overly long response. Such an overflow allows arbitrary code to be executed, with the privileges of the newspost process, on the affected systems.

- + http://people.freebsd.org/~niels/issues/newspost-20050114.txt @@ -482,6 +483,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 2005-02-01
+ newsfetch -- server response buffer overflow vulnerability @@ -497,7 +499,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. this is done without any proper bounds checking. As a result long server responses may cause an overflow when a newsgroup listing is requested from an NNTP server.

- + http://people.freebsd.org/~niels/issues/newsfetch-20050119.txt @@ -508,6 +510,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 2005-02-01
+ squid -- buffer overflow in WCCP recvfrom() call @@ -537,16 +540,16 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - CAN-2005-0211 - http://www.squid-cache.org/Advisories/SQUID-2005_3.txt - http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-wccp_buffer_overflow - http://www.squid-cache.org/bugs/show_bug.cgi?id=1217 - 886006 + CAN-2005-0211 + 886006 + http://www.squid-cache.org/Advisories/SQUID-2005_3.txt + http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-wccp_buffer_overflow + http://www.squid-cache.org/bugs/show_bug.cgi?id=1217 2005-01-28 2005-01-28 - 2005-02-08 + 2005-02-13 @@ -2113,7 +2116,7 @@ http_access deny Gopher

The setuid root elvprsv utility, used to preserve recovery helvis files, can be abused by local users to delete - with root privileges.

+ with root privileges.

The problem is that elvprsv deletes files when it thinks they have become corrupt. When elvprsv is pointed to a normal file then it will almost always think the file is corrupt and deletes it. @@ -3134,7 +3137,7 @@ http_access deny Gopher MySQL bug report. Attackers that have control of a MySQL account can easily use a modified version of that script during an attack.

- + CAN-2004-0837 11357 @@ -3251,7 +3254,7 @@ http_access deny Gopher 2004-03-23 - 2004-12-16 + 2004-12-16 -- cgit