aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
authorMartin Wilke <miwi@FreeBSD.org>2009-05-30 19:07:01 +0000
committerMartin Wilke <miwi@FreeBSD.org>2009-05-30 19:07:01 +0000
commit308ba07507e09fa335d9a864aef8b05e8859611a (patch)
tree1672e36d352c1440cc69a5b04b99110d2ac3eb82 /security/vuxml/vuln.xml
parent0fd8d9d156151bc7462011d06772d656fa635d2b (diff)
downloadports-308ba07507e09fa335d9a864aef8b05e8859611a.tar.gz
ports-308ba07507e09fa335d9a864aef8b05e8859611a.zip
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml34
1 files changed, 34 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index e8c1ef4c460f..d39d86e0fd3f 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,40 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="80f13884-4d4c-11de-8811-0030843d3802">
+ <topic>slim -- local disclosure of X authority magic cookie</topic>
+ <affects>
+ <package>
+ <name>slim</name>
+ <range><lt>1.3.1_3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>secunia reports:</p>
+ <blockquote cite="http://secunia.com/advisories/35132/">
+ <p>A security issue has been reported in SLiM, which can be
+ exploited by malicious, local users to disclose sensitive
+ information.</p>
+ <p>The security issue is caused due to the application
+ generating the X authority file by passing the X authority
+ cookie via the command line to "xauth". This can be exploited
+ to disclose the X authority cookie by consulting the process
+ list and e.g. gain access the user's display.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>35015</bid>
+ <cvename>CVE-2009-1756</cvename>
+ <url>http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529306</url>
+ </references>
+ <dates>
+ <discovery>2009-05-20</discovery>
+ <entry>2009-05-30</entry>
+ </dates>
+ </vuln>
+
<vuln vid="4175c811-f690-4898-87c5-755b3cf1bac6">
<topic>ntp -- stack-based buffer overflow</topic>
<affects>