diff options
author | Simon L. B. Nielsen <simon@FreeBSD.org> | 2005-03-21 21:19:21 +0000 |
---|---|---|
committer | Simon L. B. Nielsen <simon@FreeBSD.org> | 2005-03-21 21:19:21 +0000 |
commit | 5b82e7ed5435dcd7890746d52c6c24b03f9e67f5 (patch) | |
tree | 12cc3c1757228ea61094f0c7e9d0c3f16a17a5af /security/vuxml/vuln.xml | |
parent | e551c99e0ac4bacbd60b87d8630c580cbec90c88 (diff) |
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r-- | security/vuxml/vuln.xml | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 223a5a826c11..0acb100c3cd7 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,37 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="a4bd3039-9a48-11d9-a256-0001020eed82"> + <topic>xv -- filename handling format string vulnerability</topic> + <affects> + <package> + <name>xv</name> + <name>ja-xv</name> + <range><lt>3.10a_5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>A Gentoo Linux Security Advisory reports:</p> + <blockquote cite="http://www.gentoo.org/security/en/glsa/glsa-200503-09.xml"> + <p>Tavis Ormandy of the Gentoo Linux Security Audit Team + identified a flaw in the handling of image filenames by xv.</p> + <p>Successful exploitation would require a victim to process + a specially crafted image with a malformed filename, + potentially resulting in the execution of arbitrary code.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CAN-2005-0665</cvename> + <url>http://www.gentoo.org/security/en/glsa/glsa-200503-09.xml</url> + </references> + <dates> + <discovery>2005-03-01</discovery> + <entry>2005-03-21</entry> + </dates> + </vuln> + <vuln vid="972697a7-9a42-11d9-a256-0001020eed82"> <topic>kdelibs -- local DCOP denial of service vulnerability</topic> <affects> |