aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorXin LI <delphij@FreeBSD.org>2011-02-11 19:51:20 +0000
committerXin LI <delphij@FreeBSD.org>2011-02-11 19:51:20 +0000
commit7adbdc82a21bd7f716520dc5c56e738a0f5b84f7 (patch)
tree95e12e4c9ab655933050723d446581afee38653e /security
parent7fb7de0219bf7e93f5d80fc012760f3371c0bcc1 (diff)
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml31
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 2b916c8a2738..762ecee1ccce 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,37 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="1cae628c-3569-11e0-8e81-0022190034c0">
+ <topic>rubygem-mail -- Remote Arbitrary Shell Command Injection Vulnerability</topic>
+ <affects>
+ <package>
+ <name>rubygem-mail</name>
+ <range><lt>2.2.15</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Secunia reports:</p>
+ <blockquote cite="http://secunia.com/advisories/43077/">
+ <p>Input passed via an email from address is not properly sanitised
+ in the "deliver()" function (lib/mail/network/delivery_methods/sendmail.rb)
+ before being used as a command line argument. This can be exploited
+ to inject arbitrary shell commands.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>46021</bid>
+ <cvename>CVE-2011-0739</cvename>
+ <url>http://secunia.com/advisories/43077/</url>
+ <url>http://groups.google.com/group/mail-ruby/browse_thread/thread/e93bbd05706478dd?pli=1</url>
+ </references>
+ <dates>
+ <discovery>2011-01-25</discovery>
+ <entry>2011-02-10</entry>
+ </dates>
+ </vuln>
+
<vuln vid="7c492ea2-3566-11e0-8e81-0022190034c0">
<topic>plone -- Remote Security Bypass</topic>
<affects>