aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorAndrew Pantyukhin <sat@FreeBSD.org>2006-10-04 17:10:46 +0000
committerAndrew Pantyukhin <sat@FreeBSD.org>2006-10-04 17:10:46 +0000
commit9a84996c585cde70097a3a848286c2d3ccfe300f (patch)
tree8554eddc135f8b5c59c2c26a3a2290d0e75516c2 /security
parent1d5496ffce3651d96a3703d6e508bc007ad272a0 (diff)
downloadports-9a84996c585cde70097a3a848286c2d3ccfe300f.tar.gz
ports-9a84996c585cde70097a3a848286c2d3ccfe300f.zip
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml39
1 files changed, 39 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index ddab17ec3544..bb05af5e726a 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,45 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="86526ba4-53c8-11db-8f1a-000a48049292">
+ <topic>phpbb -- NULL byte injection vulnerability</topic>
+ <affects>
+ <package>
+ <name>phpbb</name>
+ <name>zh-phpbb-tw</name>
+ <range><lt>2.0.22</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Secunia reports:</p>
+ <blockquote cite="http://secunia.com/advisories/22188/">
+ <p>ShAnKaR has discovered a vulnerability in phpBB, which can
+ be exploited by malicious users to compromise a vulnerable
+ system.</p>
+ <p>Input passed to the "avatar_path" parameter in
+ admin/admin_board.php is not properly sanitised before
+ being used as a configuration variable to store avatar
+ images. This can be exploited to upload and execute
+ arbitrary PHP code by changing "avatar_path" to a file with
+ a trailing NULL byte.</p>
+ <p>Successful exploitation requires privileges to the
+ administration section.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2006-4758</cvename>
+ <url>http://secunia.com/advisories/22188/</url>
+ <url>http://xforce.iss.net/xforce/xfdb/28884</url>
+ <url>http://www.security.nnov.ru/Odocument221.html</url>
+ </references>
+ <dates>
+ <discovery>2006-09-12</discovery>
+ <entry>2006-10-04</entry>
+ </dates>
+ </vuln>
+
<vuln vid="35f2679f-52d7-11db-8f1a-000a48049292">
<topic>postnuke -- admin section SQL injection</topic>
<affects>