aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authornectar <nectar@FreeBSD.org>2004-03-03 21:58:53 +0800
committernectar <nectar@FreeBSD.org>2004-03-03 21:58:53 +0800
commitff6e1961ce69cf8e8f88534dfdc0fa91b99c335f (patch)
treeb0782e5f9ae111a04e566f05c8efec196f89941d /security
parent17eb09dc3b7a28cb0d8a78056d261058765b65d0 (diff)
downloadfreebsd-ports-graphics-ff6e1961ce69cf8e8f88534dfdc0fa91b99c335f.tar.gz
freebsd-ports-graphics-ff6e1961ce69cf8e8f88534dfdc0fa91b99c335f.tar.zst
freebsd-ports-graphics-ff6e1961ce69cf8e8f88534dfdc0fa91b99c335f.zip
Christian Weisgerber <naddy@FreeBSD.org> fixed the metamail fix.
Add mod_python DoS issue.
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml89
1 files changed, 59 insertions, 30 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 3a9efaa55cd..55f3264f1a8 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,65 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
"http://www.vuxml.org/dtd/vuxml-1/vuxml-10.dtd">
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="a20082c3-6255-11d8-80e3-0020ed76ef5a">
+ <topic>metamail format string bugs and buffer overflows</topic>
+ <affects>
+ <package>
+ <name>metamail</name>
+ <range><lt>2.7_2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Ulf Härnhammar reported four bugs in metamail: two are format
+ string bugs and two are buffer overflows. The bugs are in
+ SaveSquirrelFile(), PrintHeader(), and ShareThisHeader().</p>
+ <p>These vulnerabilities could be triggered by a maliciously
+ formatted email message if `metamail' or `splitmail' is used
+ to process it, possibly resulting in arbitrary code execution
+ with the privileges of the user reading mail.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CAN-2004-0104</cvename>
+ <cvename>CAN-2004-0105</cvename>
+ </references>
+ <dates>
+ <discovery>2004-02-18</discovery>
+ <entry>2004-02-18</entry>
+ <modified>2004-03-03</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="1a448eb7-6988-11d8-873f-0020ed76ef5a">
+ <topic>mod_python denial-of-service vulenerability in parse_qs</topic>
+ <affects>
+ <package>
+ <name>mod_python</name>
+ <range><lt>2.7.10</lt></range>
+ <range><lt>3.0.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>An attacker may cause Apache with mod_python to crash
+ by using a specially constructed query string.</p>
+ <p><em>Note:</em> It was announced that this bug was fixed in
+ mod_python 2.7.9 also. However, there are only changes in
+ documentation between 2.7.8 and 2.7.9.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CAN-2003-0973</cvename>
+ <bid>9129</bid>
+ <url>http://www.modpython.org/pipermail/mod_python/2003-November/014532.html</url>
+ </references>
+ <dates>
+ <discovery>2003-11-28</discovery>
+ <entry>2004-03-03</entry>
+ </dates>
+ </vuln>
+
<vuln vid="ac4b9d18-67a9-11d8-80e3-0020ed76ef5a">
<topic>fetchmail denial-of-service vulnerabilities</topic>
<affects>
@@ -385,36 +444,6 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
</dates>
</vuln>
- <vuln vid="a20082c3-6255-11d8-80e3-0020ed76ef5a">
- <topic>metamail format string bugs and buffer overflows</topic>
- <affects>
- <package>
- <name>metamail</name>
- <range><lt>2.7_1</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Ulf Härnhammar reported four bugs in metamail: two are format
- string bugs and two are buffer overflows. The bugs are in
- SaveSquirrelFile(), PrintHeader(), and ShareThisHeader().</p>
- <p>These vulnerabilities could be triggered by a maliciously
- formatted email message if `metamail' or `splitmail' is used
- to process it, possibly resulting in arbitrary code execution
- with the privileges of the user reading mail.</p>
- </body>
- </description>
- <references>
- <cvename>CAN-2004-0104</cvename>
- <cvename>CAN-2004-0105</cvename>
- </references>
- <dates>
- <discovery>2004-02-18</discovery>
- <entry>2004-02-18</entry>
- <modified>2004-02-19</modified>
- </dates>
- </vuln>
-
<vuln vid="3837f462-5d6b-11d8-80e3-0020ed76ef5a">
<topic>Buffer overflows in XFree86 servers</topic>
<affects>