aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorSimon L. B. Nielsen <simon@FreeBSD.org>2004-12-01 19:38:39 +0000
committerSimon L. B. Nielsen <simon@FreeBSD.org>2004-12-01 19:38:39 +0000
commitd0f583c274c9f1a9974143553a3ac98bd6641d99 (patch)
tree0b4afe7dc383419194b41858217e8a245aae5c8c /security
parent50bc9f178989681404072b4fb0efd56642ba271f (diff)
downloadports-d0f583c274c9f1a9974143553a3ac98bd6641d99.tar.gz
ports-d0f583c274c9f1a9974143553a3ac98bd6641d99.zip
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml33
1 files changed, 33 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 4f14b715b57b..c60ce56cd5e0 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,39 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="40549bbf-43b5-11d9-a9e7-0001020eed82">
+ <topic>zip -- long path buffer overflow</topic>
+ <affects>
+ <package>
+ <name>zip</name>
+ <range><lt>2.3_2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>A HexView security advisory reports:</p>
+ <blockquote cite="http://www.hexview.com/docs/20041103-1.txt">
+ <p>When zip performs recursive folder compression, it does
+ not check for the length of resulting path. If the path is
+ too long, a buffer overflow occurs leading to stack
+ corruption and segmentation fault. It is possible to
+ exploit this vulnerability by embedding a shellcode in
+ directory or file name. While the issue is not of primary
+ concern for regular users, it can be critical for
+ environments where zip archives are re-compressed
+ automatically using Info-Zip application.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://www.hexview.com/docs/20041103-1.txt</url>
+ </references>
+ <dates>
+ <discovery>2004-10-03</discovery>
+ <entry>2004-12-01</entry>
+ </dates>
+ </vuln>
+
<vuln vid="85edfb6a-43a5-11d9-a9e7-0001020eed82">
<topic>sudoscript -- signal delivery vulnerability</topic>
<affects>