aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJosef El-Rayes <josef@FreeBSD.org>2004-11-30 21:54:53 +0000
committerJosef El-Rayes <josef@FreeBSD.org>2004-11-30 21:54:53 +0000
commitbdaed38bb1413f73b07bc456ed81ba00c4dea501 (patch)
tree5d3016a376b7f52c683e1a4f1a5e9f7f9dbda79c
parent3e1ab817c9290ece1e93b50bb4aa9fb236c39406 (diff)
Notes
-rw-r--r--security/vuxml/vuln.xml27
1 files changed, 27 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 730384c1675b..1d4be88822c6 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,33 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="553224e7-4325-11d9-a3d5-000c6e8f12ef">
+ <topic>jabberd -- remote buffer overflow vulnerability</topic>
+ <affects>
+ <package>
+ <name>jabberd</name>
+ <range><ge>2.*</ge><le>2.0.4</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Caused by improper bounds-checking of username
+ and password in the C2S module, it is possible
+ for an attacker to cause a remote buffer overflow.
+ The server directly handles the userinput with
+ SQL backend functions - malicious input may lead
+ to buffer overflow.</p>
+ </body>
+ </description>
+ <references>
+ <mlist msgid="41A3FEE1.5030701@0x557.org">http://marc.theaimsgroup.com/?l=bugtraq&amp;m=110144303826709</mlist>
+ </references>
+ <dates>
+ <discovery>2004-11-24</discovery>
+ <entry>2004-11-30</entry>
+ </dates>
+ </vuln>
+
<vuln vid="cdf14b68-3ff9-11d9-8405-00065be4b5b6">
<topic>Open Dc Hub -- remote buffer overflow vulnerability</topic>
<affects>