aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
authorBeech Rintoul <beech@FreeBSD.org>2007-11-06 09:58:50 +0000
committerBeech Rintoul <beech@FreeBSD.org>2007-11-06 09:58:50 +0000
commitf2dccfb69df63c74bcf768a864e654bfcae0489d (patch)
tree3ef0092761a3ef003a78d5b5b2f8b8afa0950a94 /security/vuxml/vuln.xml
parentfaf7759aa6b67a0103ef9e2cf5bce9e672f51c48 (diff)
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml31
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index b30db3ca881b..b964ec32f0d4 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,37 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="617a4021-8bf0-11dc-bffa-0016179b2dd5">
+ <topic>perdition -- str_vwrite format string vulnerability</topic>
+ <affects>
+ <package>
+ <name>perdition</name>
+ <range><lt>1.17</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>SEC-Consult reports:</p>
+ <blockquote cite="http://www.sec-consult.com/300.html">
+ <p>Perdition IMAP is affected by a format string bug in one of its
+ IMAP output-string formatting functions. The bug allows the
+ execution of arbitrary code on the affected server.
+ A successful exploit does not require prior authentication.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>26270</bid>
+ <cvename>CVE-2007-5740</cvename>
+ <url>http://www.sec-consult.com/300.html</url>
+ <url>http://secunia.com/advisories/27458</url>
+ </references>
+ <dates>
+ <discovery>2007-10-31</discovery>
+ <entry>2007-11-05</entry>
+ </dates>
+ </vuln>
+
<vuln vid="f8b0f83c-8bb3-11dc-bffa-0016179b2dd5">
<topic>gftp -- multiple vulnerabilities</topic>
<affects>