aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authornectar <nectar@FreeBSD.org>2004-02-12 23:01:48 +0800
committernectar <nectar@FreeBSD.org>2004-02-12 23:01:48 +0800
commit68566378557f890c1b14dae70b0671475e9a3f86 (patch)
treecfef396f7c190aeb5833c312eab48a5ef25ded0b /security
parent76dccd4f543783e8147c3cf626f582ea68a69533 (diff)
downloadfreebsd-ports-graphics-68566378557f890c1b14dae70b0671475e9a3f86.tar.gz
freebsd-ports-graphics-68566378557f890c1b14dae70b0671475e9a3f86.tar.zst
freebsd-ports-graphics-68566378557f890c1b14dae70b0671475e9a3f86.zip
Note XFree86 server buffer overflows.
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml33
1 files changed, 33 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 2d4cfa5686c..4f2ed2a5492 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,39 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
"http://www.vuxml.org/dtd/vuxml-1/vuxml-10.dtd">
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+
+ <vuln vid="3837f462-5d6b-11d8-80e3-0020ed76ef5a">
+ <topic>Buffer overflows in XFree86 servers</topic>
+ <affects>
+ <package>
+ <name>XFree86-Server</name>
+ <range><le>4.3.0_13</le></range>
+ <range><ge>4.3.99</ge><le>4.3.99.15_1</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>A number of buffer overflows were recently discovered in
+ XFree86, prompted by initial discoveries by iDEFENSE. These
+ buffer overflows are present in the font alias handling. An
+ attacker with authenticated access to a running X server may
+ exploit these vulnerabilities to obtain root privileges on
+ the machine running the X server.</p>
+ </body>
+ </description>
+ <references>
+ <url>http://www.idefense.com/application/poi/display?id=72</url>
+ <url>http://www.idefense.com/application/poi/display?id=73</url>
+ <cvename>CAN-2004-0083</cvename>
+ <cvename>CAN-2004-0084</cvename>
+ <cvename>CAN-2004-0106</cvename>
+ </references>
+ <dates>
+ <discovery>2004/02/10</discovery>
+ <entry>2004/02/12</entry>
+ </dates>
+ </vuln>
+
<vuln vid="67c05283-5d62-11d8-80e3-0020ed76ef5a">
<topic>Buffer overflow in Mutt 1.4</topic>
<affects>