diff options
author | Josef El-Rayes <josef@FreeBSD.org> | 2004-11-30 21:54:53 +0000 |
---|---|---|
committer | Josef El-Rayes <josef@FreeBSD.org> | 2004-11-30 21:54:53 +0000 |
commit | bdaed38bb1413f73b07bc456ed81ba00c4dea501 (patch) | |
tree | 5d3016a376b7f52c683e1a4f1a5e9f7f9dbda79c | |
parent | 3e1ab817c9290ece1e93b50bb4aa9fb236c39406 (diff) |
Notes
-rw-r--r-- | security/vuxml/vuln.xml | 27 |
1 files changed, 27 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 730384c1675b..1d4be88822c6 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,33 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="553224e7-4325-11d9-a3d5-000c6e8f12ef"> + <topic>jabberd -- remote buffer overflow vulnerability</topic> + <affects> + <package> + <name>jabberd</name> + <range><ge>2.*</ge><le>2.0.4</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Caused by improper bounds-checking of username + and password in the C2S module, it is possible + for an attacker to cause a remote buffer overflow. + The server directly handles the userinput with + SQL backend functions - malicious input may lead + to buffer overflow.</p> + </body> + </description> + <references> + <mlist msgid="41A3FEE1.5030701@0x557.org">http://marc.theaimsgroup.com/?l=bugtraq&m=110144303826709</mlist> + </references> + <dates> + <discovery>2004-11-24</discovery> + <entry>2004-11-30</entry> + </dates> + </vuln> + <vuln vid="cdf14b68-3ff9-11d9-8405-00065be4b5b6"> <topic>Open Dc Hub -- remote buffer overflow vulnerability</topic> <affects> |