diff options
author | Martin Wilke <miwi@FreeBSD.org> | 2007-06-09 17:46:22 +0000 |
---|---|---|
committer | Martin Wilke <miwi@FreeBSD.org> | 2007-06-09 17:46:22 +0000 |
commit | c3ae8a8590602b26b56a89dd2e3075321a7c07b6 (patch) | |
tree | b6b6a236b29ef63f199005b3fe195ad64e3990f8 /security | |
parent | d00658d43679b81c96f2e4e44b6afd05cf158308 (diff) | |
download | ports-c3ae8a8590602b26b56a89dd2e3075321a7c07b6.tar.gz ports-c3ae8a8590602b26b56a89dd2e3075321a7c07b6.zip |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 29 |
1 files changed, 29 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 7dc5bff8b839..340a60530261 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,35 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="70ae62b0-16b0-11dc-b803-0016179b2dd5"> + <topic>c-ares -- DNS Cache Poisoning Vulnerability</topic> + <affects> + <package> + <name>c-ares</name> + <range><lt>1.4.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>secunia reports:</p> + <blockquote cite="http://secunia.com/advisories/25579/"> + <p>The vulnerability is caused due to predictable + DNS "Transaction ID" field in DNS queries and can + be exploited to poison the DNS cache of an application + using the library if a valid ID is guessed.</p> + </blockquote> + </body> + </description> + <references> + <url>http://secunia.com/advisories/25579/</url> + <url>http://cool.haxx.se/cvs.cgi/curl/ares/CHANGES?rev=HEAD&content-type=text/vnd.viewcvs-markup</url> + </references> + <dates> + <discovery>2007-06-08</discovery> + <entry>2007-06-09</entry> + </dates> + </vuln> + <vuln vid="0838733d-1698-11dc-a197-0011098b2f36"> <topic>wordpress -- XMLRPC SQL Injection</topic> <affects> |