diff options
author | Jacques Vidrine <nectar@FreeBSD.org> | 2004-03-31 20:33:24 +0000 |
---|---|---|
committer | Jacques Vidrine <nectar@FreeBSD.org> | 2004-03-31 20:33:24 +0000 |
commit | 9b7a8976f4c07696a5417f1597090d6ebd197df2 (patch) | |
tree | 3e592c352cb3358d91784bba2ef2c77dfe22e35a /security | |
parent | e52f46d2d24ef1bbb3ea9d9a05c418626384ee11 (diff) |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 52 |
1 files changed, 52 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 987095922714..f3241b4d5ff4 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -31,6 +31,58 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="98bd69c3-834b-11d8-a41f-0020ed76ef5a"> + <topic>Courier mail services: remotely exploitable buffer overflows</topic> + <affects> + <package> + <name>courier</name> + <range><lt>0.45</lt></range> + </package> + <package> + <name>courier-imap</name> + <range><lt>3.0</lt></range> + </package> + <package> + <name>sqwebmail</name> + <range><lt>4.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Courier set of mail services use a common Unicode + library. This library contains buffer overflows in the + converters for two popular Japanese character encodings. + These overflows may be remotely exploitable, triggered by + a maliciously formatted email message that is later processed + by one of the Courier mail services. + From the release notes for the corrected versions of the + Courier set of mail services:</p> + <blockquote> + <p>iso2022jp.c: Converters became (upper-)compatible with + ISO-2022-JP (RFC1468 / JIS X 0208:1997 Annex 2) and + ISO-2022-JP-1 (RFC2237). Buffer overflow vulnerability + (when Unicode character is out of BMP range) has been + closed. Convert error handling was implemented.</p> + <p>shiftjis.c: Broken SHIFT_JIS converters has been fixed + and became (upper-)compatible with Shifted Encoding Method + (JIS X 0208:1997 Annex 1). Buffer overflow vulnerability + (when Unicode character is out of BMP range) has been + closed. Convert error handling was implemented.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CAN-2004-0224</cvename> + <url>http://cvs.sourceforge.net/viewcvs.py/courier/libs/unicode/iso2022jp.c?rev=1.10&view=markup</url> + <url>http://cvs.sourceforge.net/viewcvs.py/courier/libs/unicode/shiftjis.c?rev=1.6&view=markup</url> + <bid>9845</bid> + </references> + <dates> + <discovery>2004-02-01</discovery> + <entry>2004-03-31</entry> + </dates> + </vuln> + <vuln vid="b7cb488c-8349-11d8-a41f-0020ed76ef5a"> <topic>isakmpd payload handling denial-of-service vulnerabilities</topic> <affects> |