aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
authorRemko Lodder <remko@FreeBSD.org>2006-06-08 17:10:56 +0000
committerRemko Lodder <remko@FreeBSD.org>2006-06-08 17:10:56 +0000
commit23df5a01666ede3e859852bef2391d297499244d (patch)
tree295832422952548c3ff940bf7f534a63b87b23ad /security/vuxml/vuln.xml
parent8d9b54b9e5219ed9cfd43f2cefd89fe1b9d0f60c (diff)
downloadports-23df5a01666ede3e859852bef2391d297499244d.tar.gz
ports-23df5a01666ede3e859852bef2391d297499244d.zip
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml71
1 files changed, 71 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 81be2266710e..3cb0c3824d9b 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,77 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="ec2f2ff5-f710-11da-9156-000e0c2e438a">
+ <topic>freeradius -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>freeradius</name>
+ <range><ge>1.0.0</ge><le>1.0.4</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The freeradious development team reports:</p>
+ <blockquote cite="http://www.freeradius.org/security.html">
+ <p>Multiple issues exist with version 1.0.4, and all prior
+ versions of the server. Externally exploitable
+ vulnerabilities exist only for sites that use the
+ rlm_sqlcounter module. Those sites may be vulnerable to
+ SQL injection attacks, similar to the issues noted below.
+ All sites that have not deployed the rlm_sqlcounter module
+ are not vulnerable to external exploits.</p>
+ <p>The issues are:<br />
+ SQL Injection attack in the rlm_sqlcounter module.<br />
+ Buffer overflow in the rlm_sqlcounter module, that may cause
+ a server crash. <br />
+ Buffer overflow while expanding %t, that may cause a server
+ crash.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>17171</bid>
+ <cvename>CVE-2005-4744</cvename>
+ </references>
+ <dates>
+ <discovery>2005-09-09</discovery>
+ <entry>2006-06-08</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="1a216dfd-f710-11da-9156-000e0c2e438a">
+ <topic>freeradius -- authentication bypass vulnerability</topic>
+ <affects>
+ <package>
+ <name>freeradius</name>
+ <range><gt>1.0.0</gt><le>1.1.0</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The freeradius development team reports:</p>
+ <blockquote cite="http://www.freeradius.org/security.html">
+ <p>A validation issue exists with the EAP-MSCHAPv2 module
+ in all versions from 1.0.0 (where the module first
+ appeared) to 1.1.0. Insufficient input validation was being
+ done in the EAP-MSCHAPv2 state machine. A malicious
+ attacker could manipulate their EAP-MSCHAPv2 client state
+ machine to potentially convince the server to bypass
+ authentication checks. This bypassing could also result
+ in the server crashing</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>17293</bid>
+ <cvename>CVE-2006-1354</cvename>
+ </references>
+ <dates>
+ <discovery>2006-06-03</discovery>
+ <entry>2006-06-08</entry>
+ </dates>
+ </vuln>
+
<vuln vid="00784d6e-f4ce-11da-87a1-000c6ec775d9">
<topic>squirrelmail -- plugin.php local file inclusion
vulnerability</topic>