diff options
author | Wesley Shields <wxs@FreeBSD.org> | 2012-01-09 02:26:53 +0000 |
---|---|---|
committer | Wesley Shields <wxs@FreeBSD.org> | 2012-01-09 02:26:53 +0000 |
commit | b02ccddb0689f1690935bedd8fc9f0b568fbd6b5 (patch) | |
tree | 367550694771f87ab450cd35e273d1b3629d8eef /security/vuxml/vuln.xml | |
parent | c9fde86009f9b2b4bb7912983ca9683d01df228e (diff) |
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r-- | security/vuxml/vuln.xml | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 5f537fc1b070..a4497ba0b722 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -47,6 +47,37 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="a47af810-3a17-11e1-a1be-00e0815b8da8"> + <topic>spamdyke -- STARTTLS Plaintext Injection Vulnerability</topic> + <affects> + <package> + <name>spamdyke</name> + <range><lt>4.2.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Secunia reports:</p> + <blockquote cite="http://secunia.com/advisories/47435/"> + <p>The vulnerability is caused due to the TLS implementation not + properly clearing transport layer buffers when upgrading from + plaintext to ciphertext after receiving the "STARTTLS" command. + This can be exploited to insert arbitrary plaintext data (e.g. + SMTP commands) during the plaintext phase, which will then be + executed after upgrading to the TLS ciphertext phase.</p> + </blockquote> + </body> + </description> + <references> + <url>http://secunia.com/advisories/47435/</url> + <url>http://www.spamdyke.org/documentation/Changelog.txt</url> + </references> + <dates> + <discovery>2012-01-04</discovery> + <entry>2012-01-08</entry> + </dates> + </vuln> + <vuln vid="1a1aef8e-3894-11e1-8b5c-00262d5ed8ee"> <topic>chromium -- multiple vulnerabilities</topic> <affects> |