diff options
author | Simon L. B. Nielsen <simon@FreeBSD.org> | 2004-12-01 19:38:39 +0000 |
---|---|---|
committer | Simon L. B. Nielsen <simon@FreeBSD.org> | 2004-12-01 19:38:39 +0000 |
commit | d0f583c274c9f1a9974143553a3ac98bd6641d99 (patch) | |
tree | 0b4afe7dc383419194b41858217e8a245aae5c8c /security | |
parent | 50bc9f178989681404072b4fb0efd56642ba271f (diff) | |
download | ports-d0f583c274c9f1a9974143553a3ac98bd6641d99.tar.gz ports-d0f583c274c9f1a9974143553a3ac98bd6641d99.zip |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 33 |
1 files changed, 33 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 4f14b715b57b..c60ce56cd5e0 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,39 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="40549bbf-43b5-11d9-a9e7-0001020eed82"> + <topic>zip -- long path buffer overflow</topic> + <affects> + <package> + <name>zip</name> + <range><lt>2.3_2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>A HexView security advisory reports:</p> + <blockquote cite="http://www.hexview.com/docs/20041103-1.txt"> + <p>When zip performs recursive folder compression, it does + not check for the length of resulting path. If the path is + too long, a buffer overflow occurs leading to stack + corruption and segmentation fault. It is possible to + exploit this vulnerability by embedding a shellcode in + directory or file name. While the issue is not of primary + concern for regular users, it can be critical for + environments where zip archives are re-compressed + automatically using Info-Zip application.</p> + </blockquote> + </body> + </description> + <references> + <url>http://www.hexview.com/docs/20041103-1.txt</url> + </references> + <dates> + <discovery>2004-10-03</discovery> + <entry>2004-12-01</entry> + </dates> + </vuln> + <vuln vid="85edfb6a-43a5-11d9-a9e7-0001020eed82"> <topic>sudoscript -- signal delivery vulnerability</topic> <affects> |