aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authormiwi <miwi@FreeBSD.org>2009-03-19 00:18:57 +0800
committermiwi <miwi@FreeBSD.org>2009-03-19 00:18:57 +0800
commit5d7ff0545bde166a5a357a3c750324aca25e9007 (patch)
treed36da1367a5da14db06ac49395a2489cb48aa2a3 /security/vuxml
parent425e0882da3aee903eaeb27ec38afdad95cb52a9 (diff)
downloadfreebsd-ports-graphics-5d7ff0545bde166a5a357a3c750324aca25e9007.tar.gz
freebsd-ports-graphics-5d7ff0545bde166a5a357a3c750324aca25e9007.tar.zst
freebsd-ports-graphics-5d7ff0545bde166a5a357a3c750324aca25e9007.zip
- Added more references to the netatalk
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml5
1 files changed, 4 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 370869f6b7a..63dc8eb561b 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -50,7 +50,7 @@ Note: Please add new entries to the beginning of this file.
can be exploited by malicious users to compromise a vulnerable system.</p>
<p>The vulnerability is caused due to the papd daemon improperly
sanitising several received parameters before passing them in a call
- to "popen()". This can be exploited to execute arbitrary commands via
+ to popen(). This can be exploited to execute arbitrary commands via
a specially crafted printing request.</p>
<p>Successful exploitation requires that a printer is configured to
pass arbitrary values as parameters to a piped command.</p>
@@ -58,12 +58,15 @@ Note: Please add new entries to the beginning of this file.
</body>
</description>
<references>
+ <bid>32925</bid>
<cvename>CVE-2008-5718</cvename>
<url>http://secunia.com/advisories/33227/</url>
+ <url>http://www.openwall.com/lists/oss-security/2009/01/13/3</url>
</references>
<dates>
<discovery>2008-12-19</discovery>
<entry>2009-03-18</entry>
+ <modified>2009-03-18</modified>
</dates>
</vuln>