diff options
author | Hiroki Sato <hrs@FreeBSD.org> | 2005-02-27 13:21:10 +0000 |
---|---|---|
committer | Hiroki Sato <hrs@FreeBSD.org> | 2005-02-27 13:21:10 +0000 |
commit | fbb0c798ac848ba129dabeacb31c9a80cb04b42d (patch) | |
tree | 162073c16629c5b1e74f8e6c03c1de12d53bfda5 /security | |
parent | 2b47d152d89a6d8ce3d32c66e8b38794fe01d879 (diff) |
Document format string vulnerabilities in net/sup.
Notes
Notes:
svn path=/head/; revision=129884
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 33 |
1 files changed, 33 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index ede51ece2c58..714de90068b1 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,39 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="2c5757f4-88bf-11d9-8720-0007e900f87b"> + <topic>sup -- format string vulnerability</topic> + <affects> + <package> + <name>sup</name> + <range><lt>2.0.20050226</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Debian Security Advisory reports:</p> + <blockquote cite="http://www.securityfocus.com/advisories/6874"> + <p>jaguar@felinemenace.org discovered a format string + vulnerability in sup, a set of programs to synchronize + collections of files across a number of machines, + whereby a remote attacker could potentially cause + arbitrary code to be executed with the privileges + of the supfilesrv process (this process does not run + automatically by default). </p> + </blockquote> + </body> + </description> + <references> + <cvename>CAN-2004-0451</cvename> + <url>http://www.securityfocus.com/advisories/6874</url> + <url>http://www.securityfocus.com/bid/10571</url> + </references> + <dates> + <discovery>2004-06-19</discovery> + <entry>2005-02-27</entry> + </dates> + </vuln> + <vuln vid="d022754d-8839-11d9-aa18-0001020eed82"> <topic>mozilla -- insecure temporary directory vulnerability</topic> <affects> |