diff options
author | Ryan Steinmetz <zi@FreeBSD.org> | 2011-12-07 23:49:09 +0000 |
---|---|---|
committer | Ryan Steinmetz <zi@FreeBSD.org> | 2011-12-07 23:49:09 +0000 |
commit | a6d2af558226692d52a59459521a92193e8191a2 (patch) | |
tree | 9e5c596fa54130ca49304c917b3aadb73ba540e1 /security/vuxml/vuln.xml | |
parent | a2a65512fdee954fa32307df522150fe73da2b5d (diff) | |
download | ports-a6d2af558226692d52a59459521a92193e8191a2.tar.gz ports-a6d2af558226692d52a59459521a92193e8191a2.zip |
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r-- | security/vuxml/vuln.xml | 32 |
1 files changed, 32 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index e49701264ee9..91d7afe9fdeb 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -47,6 +47,38 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="93be487e-211f-11e1-89b4-001ec9578670"> + <topic>isc-dhcp-server -- Remote DoS</topic> + <affects> + <package> + <name>isc-dhcp42-server</name> + <range><lt>4.2.3_1</lt></range> + </package> + <package> + <name>isc-dhcp41-server</name> + <range><lt>4.1.e_3,2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>ISC reports:</p> + <blockquote cite="https://www.isc.org/software/bind/advisories/cve-2011-4539"> + <p>A bug exists which allows an attacker who is able to send DHCP Request + packets, either directly or through a relay, to remotely crash an ISC + DHCP server if that server is configured to evaluate expressions using + a regular expression (i.e. uses the "~=" or "~~" comparison operators.)</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2011-4539</cvename> + </references> + <dates> + <discovery>2011-12-07</discovery> + <entry>2011-12-07</entry> + </dates> + </vuln> + <vuln vid="ed536336-1c57-11e1-86f4-e0cb4e266481"> <topic>phpMyAdmin -- Multiple XSS</topic> <affects> |