aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorWesley Shields <wxs@FreeBSD.org>2009-05-22 13:15:21 +0000
committerWesley Shields <wxs@FreeBSD.org>2009-05-22 13:15:21 +0000
commit5e68f8ae80d7d63ca8a20254db1cba9c1d666766 (patch)
treea2e87ba592bff401ea3b0ea7eae97f232b9fa23d /security
parenta5e28796576a78cdd40e777ac86c555dffe16328 (diff)
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml3
1 files changed, 2 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index e38acf6fed40..62c11663ed9a 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -79,7 +79,7 @@ Note: Please add new entries to the beginning of this file.
<body xmlns="http://www.w3.org/1999/xhtml">
<p>NLnet Labs:</p>
<blockquote cite="http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html">
- <p>A one-byte buffer over flow has been reported in NSD. The
+ <p>A one-byte buffer overflow has been reported in NSD. The
problem affects all versions 2.0.0 to 3.2.1. The bug allows
a carefully crafted exploit to bring down your DNS server. It
is highly unlikely that this one byte overflow can lead to
@@ -88,6 +88,7 @@ Note: Please add new entries to the beginning of this file.
</body>
</description>
<references>
+ <cvename>CVE-2009-1755</cvename>
<url>http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html</url>
</references>
<dates>