diff options
author | Wesley Shields <wxs@FreeBSD.org> | 2012-06-06 12:52:23 +0000 |
---|---|---|
committer | Wesley Shields <wxs@FreeBSD.org> | 2012-06-06 12:52:23 +0000 |
commit | b946a77996352c6b1a09c261db967a5238d893a6 (patch) | |
tree | e501622347674b1e544bd6af3a9ce96eb8ce9092 /security/vuxml/vuln.xml | |
parent | 5012771754793dd977d2c0f9d30884ddb751a73f (diff) | |
download | ports-b946a77996352c6b1a09c261db967a5238d893a6.tar.gz ports-b946a77996352c6b1a09c261db967a5238d893a6.zip |
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r-- | security/vuxml/vuln.xml | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index d36339d98f42..523e0eff86ed 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -301,12 +301,12 @@ Note: Please add new entries to the beginning of this file. <body xmlns="http://www.w3.org/1999/xhtml"> <p>Networkupstools project reports:</p> <blockquote cite="http://trac.networkupstools.org/projects/nut/changeset/3633"> - <p>NUT server (upsd), from versions 2.4.0 to 2.6.3, are exposed to</p> - <p>crashes when receiving random data from the network.</p> - <p>This issue is related to the way NUT parses characters, especially</p> - <p>from the network. Non printable characters were missed from strings</p> - <p>operation (such as strlen), but still copied to the buffer, causing</p> - <p>an overflow.</p> + <p>NUT server (upsd), from versions 2.4.0 to 2.6.3, are exposed to + crashes when receiving random data from the network.</p> + This issue is related to the way NUT parses characters, especially + from the network. Non printable characters were missed from strings + operation (such as strlen), but still copied to the buffer, causing + an overflow.</p> </blockquote> </body> </description> |