aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
authorWesley Shields <wxs@FreeBSD.org>2012-06-06 12:52:23 +0000
committerWesley Shields <wxs@FreeBSD.org>2012-06-06 12:52:23 +0000
commitb946a77996352c6b1a09c261db967a5238d893a6 (patch)
treee501622347674b1e544bd6af3a9ce96eb8ce9092 /security/vuxml/vuln.xml
parent5012771754793dd977d2c0f9d30884ddb751a73f (diff)
downloadports-b946a77996352c6b1a09c261db967a5238d893a6.tar.gz
ports-b946a77996352c6b1a09c261db967a5238d893a6.zip
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml12
1 files changed, 6 insertions, 6 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index d36339d98f42..523e0eff86ed 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -301,12 +301,12 @@ Note: Please add new entries to the beginning of this file.
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Networkupstools project reports:</p>
<blockquote cite="http://trac.networkupstools.org/projects/nut/changeset/3633">
- <p>NUT server (upsd), from versions 2.4.0 to 2.6.3, are exposed to</p>
- <p>crashes when receiving random data from the network.</p>
- <p>This issue is related to the way NUT parses characters, especially</p>
- <p>from the network. Non printable characters were missed from strings</p>
- <p>operation (such as strlen), but still copied to the buffer, causing</p>
- <p>an overflow.</p>
+ <p>NUT server (upsd), from versions 2.4.0 to 2.6.3, are exposed to
+ crashes when receiving random data from the network.</p>
+ This issue is related to the way NUT parses characters, especially
+ from the network. Non printable characters were missed from strings
+ operation (such as strlen), but still copied to the buffer, causing
+ an overflow.</p>
</blockquote>
</body>
</description>