aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
authorEitan Adler <eadler@FreeBSD.org>2012-02-14 03:31:45 +0000
committerEitan Adler <eadler@FreeBSD.org>2012-02-14 03:31:45 +0000
commitc015f4eda7b07c30041087eb57dd0011a8b710a4 (patch)
treec1ced721fca4a3d4227da437514b45c14be1b4f0 /security/vuxml/vuln.xml
parentec88ee855972e9c52468f0c60e064e1fcf0304c7 (diff)
downloadports-c015f4eda7b07c30041087eb57dd0011a8b710a4.tar.gz
ports-c015f4eda7b07c30041087eb57dd0011a8b710a4.zip
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml55
1 files changed, 55 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 377b432cddbd..15508e2145b3 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -47,6 +47,61 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="b4f8be9e-56b2-11e1-9fb7-003067b2972c">
+ <topic>Python -- DoS via malformed XML-RPC / HTTP POST request</topic>
+ <affects>
+ <package>
+ <name>python32</name>
+ <range><le>3.2.2_2</le></range>
+ </package>
+ <package>
+ <name>python31</name>
+ <range><le>3.1.4_2</le></range>
+ </package>
+ <package>
+ <name>python27</name>
+ <range><le>2.7.2_3</le></range>
+ </package>
+ <package>
+ <name>python26</name>
+ <range><le>2.6.7_2</le></range>
+ </package>
+ <package>
+ <name>python25</name>
+ <range><le>2.5.6_2</le></range>
+ </package>
+ <package>
+ <name>python24</name>
+ <range><le>2.4.5_8</le></range>
+ </package>
+ <package>
+ <name>python</name>
+ <range><le>2.7,2</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Jan Lieskovsky</p>
+ <blockquote cite="http://bugs.python.org/issue14001">
+ <p>A denial of service flaw was found in the way Simple XML-RPC Server
+ module of Python processed client connections, that were closed
+ prior the complete request body has been received. A remote attacker
+ could use this flaw to cause Python Simple XML-RPC based server
+ process to consume excessive amount of CPU.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2012-0845</cvename>
+ <url>http://bugs.python.org/issue14001</url>
+ <url>https://bugzilla.redhat.com/show_bug.cgi?id=789790</url>
+ </references>
+ <dates>
+ <discovery>2012-02-13</discovery>
+ <entry>2012-02-14</entry>
+ </dates>
+ </vuln>
+
<vuln vid="2b20fd5f-552e-11e1-9fb7-003067b2972c">
<topic>Webcalendar -- Persistent XSS</topic>
<affects>