diff options
author | Xin LI <delphij@FreeBSD.org> | 2020-09-07 18:04:21 +0000 |
---|---|---|
committer | Xin LI <delphij@FreeBSD.org> | 2020-09-07 18:04:21 +0000 |
commit | 130bd47749737865a2ada28cfe7cdc2746f3203d (patch) | |
tree | 6d68ef2a310d651cdf5687f1aea14a9697c651da /security/vuxml | |
parent | 3cf2794ffae0b35b36aa4917c44f37e01e7a6ed9 (diff) | |
download | ports-130bd47749737865a2ada28cfe7cdc2746f3203d.tar.gz ports-130bd47749737865a2ada28cfe7cdc2746f3203d.zip |
Notes
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 40 |
1 files changed, 3 insertions, 37 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index f7bc9402e1ed..fd38a3e6d2fc 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,43 +58,6 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> - <vuln vid="3749ae9e-f132-11ea-97da-d05099c0ae8c"> - <topic>MPD -- multiple vulnerabilities</topic> - <affects> - <package> - <name>mpd5</name> - <range><lt>5.9</lt></range> - </package> - </affects> - <description> - <body xmlns="http://www.w3.org/1999/xhtml"> - <p>Chen Nan of Chaitin Security Research Lab reports:</p> - <blockquote cite="http://mpd.sourceforge.net/doc5/mpd4.html#4"> - <p>Fix buffer overflow introduced in version 5.8: processing of - template %aX in a RADIUS authentication response might lead - to unexpected termination of the mpd5 process. - Installations not using RADIUS or not using %aX templates - in RADIUS attributes were not affected.</p> - <p>Fix buffer overflow in parsing of L2TP control packets - introduced in version 4.0 that initially brought in L2TP - support: a specially crafted incoming L2TP control packet - might lead to unexpected termination of the process. - Installations with neither L2TP clients nor L2TP server - configured are not affected.</p> - </blockquote> - </body> - </description> - <references> - <cvename>CVE-2020-7465</cvename> - <cvename>CVE-2020-7466</cvename> - <url>http://mpd.sourceforge.net/doc5/mpd4.html#4</url> - </references> - <dates> - <discovery>2020-09-06</discovery> - <entry>2020-09-07</entry> - </dates> - </vuln> - <vuln vid="cd97c7ca-f079-11ea-9c31-001b216d295b"> <topic>Multi-link PPP protocol daemon MPD5 remotely exploitable crash</topic> <affects> @@ -114,11 +77,14 @@ Notes: </body> </description> <references> + <cvename>CVE-2020-7465</cvename> + <cvename>CVE-2020-7466</cvename> <url>http://mpd.sourceforge.net/doc5/mpd4.html#4</url> </references> <dates> <discovery>2020-09-04</discovery> <entry>2020-09-06</entry> + <modified>2020-09-07</modified> </dates> </vuln> |