aboutsummaryrefslogtreecommitdiffstats
path: root/ports-mgmt
diff options
context:
space:
mode:
authorclement <clement@FreeBSD.org>2004-02-12 02:28:18 +0800
committerclement <clement@FreeBSD.org>2004-02-12 02:28:18 +0800
commitde6616144ae1367b0f14c730699acadf276f8506 (patch)
tree4483e3fba7b0694ac021d9d21c600af8872d4111 /ports-mgmt
parentc725730775ac7488ec6da9f10312af242e2c4b64 (diff)
downloadfreebsd-ports-graphics-de6616144ae1367b0f14c730699acadf276f8506.tar.gz
freebsd-ports-graphics-de6616144ae1367b0f14c730699acadf276f8506.tar.zst
freebsd-ports-graphics-de6616144ae1367b0f14c730699acadf276f8506.zip
Add mutt < 1.4.2 vulnerabilty.
Diffstat (limited to 'ports-mgmt')
-rw-r--r--ports-mgmt/portaudit/database/auditfile.txt1
1 files changed, 1 insertions, 0 deletions
diff --git a/ports-mgmt/portaudit/database/auditfile.txt b/ports-mgmt/portaudit/database/auditfile.txt
index d75ff83ba50..3495703868b 100644
--- a/ports-mgmt/portaudit/database/auditfile.txt
+++ b/ports-mgmt/portaudit/database/auditfile.txt
@@ -37,3 +37,4 @@ ru-apache+mod_ssl>=1.3<1.3.29|http://www.apacheweek.com/features/security-13|Mul
clamav<0.65_7|http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/62586|remote exploitable DOS vulnerability
apache+ssl>=1.3<1.3.29.1.53|http://www.apache-ssl.org/advisory-20040206.txt|optional client certificate vulnerability
monkey<0.8.2|http://monkeyd.sourceforge.net/|DoS bug caused by get_real_string()
+mutt<1.4.2|http://www.securityfocus.com/archive/1/353428/2004-02-08/2004-02-14/0|buffer overflow that can be triggered by incoming messages