aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorJosef El-Rayes <josef@FreeBSD.org>2004-12-29 16:26:03 +0000
committerJosef El-Rayes <josef@FreeBSD.org>2004-12-29 16:26:03 +0000
commitdbe1950414c58be636cbc92b6dbde86597562e53 (patch)
tree583dc401c2695127a822b40cfa8fc65b1bc4cc6b /security
parent2b144cb24b3e2e991e095628a4965377f080d13f (diff)
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml24
1 files changed, 24 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 8c642bda8661..f0e4433442de 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,30 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="64c8cc2a-59b1-11d9-8a99-000c6e8f12ef">
+ <topic>libxine -- buffer-overflow vulnerability in aiff support</topic>
+ <affects>
+ <package>
+ <name>libxine</name>
+ <range><le>1.0.r5_3</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Due to a buffer overflow in the open_aiff_file function in
+ demux_aiff.c, a remote attacker is able to execute arbitrary
+ code via a modified AIFF file.</p></body>
+ </description>
+ <references>
+ <cvename>CAN-2004-1300</cvename>
+ <url>http://tigger.uic.edu/~jlongs2/holes/xine-lib.txt</url>
+ </references>
+ <dates>
+ <discovery>2004-12-15</discovery>
+ <entry>2004-12-29</entry>
+ </dates>
+ </vuln>
+
<vuln vid="2e25d38b-54d1-11d9-b612-000c6e8f12ef">
<topic>jabberd -- denial-of-service vulnerability</topic>
<affects>