diff options
author | Martin Wilke <miwi@FreeBSD.org> | 2008-04-25 09:27:30 +0000 |
---|---|---|
committer | Martin Wilke <miwi@FreeBSD.org> | 2008-04-25 09:27:30 +0000 |
commit | 16d70b28c78684bb98a48b5365f662ec32b5fd4e (patch) | |
tree | d7a5f3974671235ccf0dfdefdc22e00f2126b53f /security/vuxml | |
parent | 8eaf77cc301849d86d367dd07b287c15d2d1868e (diff) |
Notes
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 32 |
1 files changed, 32 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index da30c850cd04..f4ed115fa6f9 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,38 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="f6377f08-12a7-11dd-bab7-0016179b2dd5"> + <topic>php -- integer overflow vulnerability</topic> + <affects> + <package> + <name>php5</name> + <range><gt>0</gt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>CVE reports:</p> + <blockquote cite="http://www.securityfocus.com/bid/28392/discuss"> + <p>Integer overflow in PHP 5.2.5 and earlier allows context-dependent + attackers to cause a denial of service and possibly have unspecified + other impact via a printf format parameter with a large width specifier, + related to the php_sprintf_appendstring function in formatted_print.c and + probably other functions for formatted strings (aka *printf functions). + </p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2008-1384</cvename> + <bid>28392</bid> + <url>http://securityreason.com/achievement_securityalert/52</url> + </references> + <dates> + <discovery>2008-03-21</discovery> + <entry>2008-04-25</entry> + </dates> + </vuln> + <vuln vid="ec41c3e2-129c-11dd-bab7-0016179b2dd5"> <topic>python -- Integer Signedness Error in zlib Module</topic> <affects> |