diff options
author | Simon L. B. Nielsen <simon@FreeBSD.org> | 2008-11-30 21:54:20 +0000 |
---|---|---|
committer | Simon L. B. Nielsen <simon@FreeBSD.org> | 2008-11-30 21:54:20 +0000 |
commit | ad0cd568d73f8ff3382772ec47de8e2b2664af1c (patch) | |
tree | aa1ffeea5bd1937db8a00a66ff6344787ddaa473 /ports-mgmt | |
parent | c82fdf4ec3460234f01c9e8455d4d380fe1752db (diff) |
Notes
Diffstat (limited to 'ports-mgmt')
-rw-r--r-- | ports-mgmt/portaudit-db/database/portaudit.xlist | 1 | ||||
-rw-r--r-- | ports-mgmt/portaudit-db/database/portaudit.xml | 45 |
2 files changed, 0 insertions, 46 deletions
diff --git a/ports-mgmt/portaudit-db/database/portaudit.xlist b/ports-mgmt/portaudit-db/database/portaudit.xlist index 034472c025f7..cc5e0be1d85c 100644 --- a/ports-mgmt/portaudit-db/database/portaudit.xlist +++ b/ports-mgmt/portaudit-db/database/portaudit.xlist @@ -6,7 +6,6 @@ 78348ea2-ec91-11d8-b913-000c41e2cdad 641859e8-eca1-11d8-b913-000c41e2cdad 603fe36d-ec9d-11d8-b913-000c41e2cdad -2de14f7a-dad9-11d8-b59a-00061bc2ad93 7a9d5dfe-c507-11d8-8898-000d6111a684 3a408f6f-9c52-11d8-9366-0020ed76ef5a e5e2883d-ceb9-11d8-8898-000d6111a684 diff --git a/ports-mgmt/portaudit-db/database/portaudit.xml b/ports-mgmt/portaudit-db/database/portaudit.xml index 61aac6d73564..f72051fa9a08 100644 --- a/ports-mgmt/portaudit-db/database/portaudit.xml +++ b/ports-mgmt/portaudit-db/database/portaudit.xml @@ -282,51 +282,6 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. </dates> </vuln> - <vuln vid="2de14f7a-dad9-11d8-b59a-00061bc2ad93"> - <topic>Multiple Potential Buffer Overruns in Samba</topic> - <affects> - <package> - <name>samba</name> - <range><ge>3.*</ge><lt>3.0.5,1</lt></range> - <range><lt>2.2.10</lt></range> - </package> - <package> - <name>ja-samba</name> - <range><lt>2.2.10.*</lt></range> - </package> - </affects> - <description> - <body xmlns="http://www.w3.org/1999/xhtml"> - <p>Evgeny Demidov discovered that the Samba server has a - buffer overflow in the Samba Web Administration Tool (SWAT) - on decoding Base64 data during HTTP Basic Authentication. - Versions 3.0.2 through 3.0.4 are affected.</p> - <p>Another buffer overflow bug has been found in the code - used to support the "mangling method = hash" smb.conf - option. The default setting for this parameter is "mangling - method = hash2" and therefore not vulnerable. Versions - between 2.2.0 through 2.2.9 and 3.0.0 through 3.0.4 are affected. - </p> - </body> - </description> - <references> - <cvename>CAN-2004-0600</cvename> - <cvename>CAN-2004-0686</cvename> - <mlist msgid="web-53121174@cgp.agava.net">http://www.securityfocus.com/archive/1/369698</mlist> - <mlist msgid="200407222031.25086.bugtraq@beyondsecurity.com">http://www.securityfocus.com/archive/1/369706</mlist> - <url>http://www.samba.org/samba/whatsnew/samba-3.0.5.html</url> - <url>http://www.samba.org/samba/whatsnew/samba-2.2.10.html</url> - <url>http://www.osvdb.org/8190</url> - <url>http://www.osvdb.org/8191</url> - <url>http://secunia.com/advisories/12130</url> - </references> - <dates> - <discovery>2004-07-14</discovery> - <entry>2004-07-21</entry> - <modified>2004-07-22</modified> - </dates> - </vuln> - <vuln vid="7a9d5dfe-c507-11d8-8898-000d6111a684"> <topic>isc-dhcp3-server buffer overflow in logging mechanism</topic> <affects> |