diff options
author | Thomas Abthorpe <tabthorpe@FreeBSD.org> | 2008-10-27 18:47:05 +0000 |
---|---|---|
committer | Thomas Abthorpe <tabthorpe@FreeBSD.org> | 2008-10-27 18:47:05 +0000 |
commit | 38c1620add856ce7de2088ddf9575072164e1a4b (patch) | |
tree | e3e77c81f8cc2552da75fd7101eae09cd38dd6d7 /security/vuxml/vuln.xml | |
parent | 1216788db51f318f3157a7d5125caf076fce20bb (diff) | |
download | ports-38c1620add856ce7de2088ddf9575072164e1a4b.tar.gz ports-38c1620add856ce7de2088ddf9575072164e1a4b.zip |
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r-- | security/vuxml/vuln.xml | 29 |
1 files changed, 29 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index c34058496a40..dfce052b6a45 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,35 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="2ddbfd29-a455-11dd-a55e-00163e000016"> + <topic>libspf2 -- Buffer overflow</topic> + <affects> + <package> + <name>libspf2</name> + <range><lt>1.2.8</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>CVE reports:</p> + <blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2469"> + <p>Heap-based buffer overflow in the SPF_dns_resolv_lookup function + in Spf_dns_resolv.c in libspf2 before 1.2.8 allows remote attackers + to execute arbitrary code via a long DNS TXT record with a modified + length field.</p> + </blockquote> + </body> + </description> + <references> + <bid>31881</bid> + <cvename>CVE-2008-2469</cvename> + </references> + <dates> + <discovery>2008-10-21</discovery> + <entry>2008-10-27</entry> + </dates> + </vuln> + <vuln vid="55616fda-a2d0-11dd-a9f9-0030843d3802"> <topic>openx -- sql injection vulnerability</topic> <affects> |