diff options
author | Remko Lodder <remko@FreeBSD.org> | 2005-05-19 19:48:14 +0000 |
---|---|---|
committer | Remko Lodder <remko@FreeBSD.org> | 2005-05-19 19:48:14 +0000 |
commit | 78d9296cfb4f380d5be53f09439d96f496810ce6 (patch) | |
tree | c26bd52d187642ac6e69759a7dcdbf7cb722937d /security/vuxml/vuln.xml | |
parent | d44b3296aa29fc80e3a9cda6cc6f4a7294603833 (diff) | |
download | ports-78d9296cfb4f380d5be53f09439d96f496810ce6.tar.gz ports-78d9296cfb4f380d5be53f09439d96f496810ce6.zip |
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r-- | security/vuxml/vuln.xml | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 43054e79de73..9dede6c66151 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -43,11 +43,11 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. <description> <body xmlns="http://www.w3.org/1999/xhtml"> <p>The developers of cdrdao report that there is a potential - root exploit in the software. In order to be able to + root exploit in the software. In order to be able to succesfully exploit this vulnerability cdrdao must be - installed setuid root. When succesfully exploited a local - user might get escalated privileges. Default this port does - not install setuid root.</p> + installed setuid root. When succesfully exploited a local + user might get escalated privileges. By default this port is + not installed setuid root.</p> </body> </description> <references> |