diff options
-rw-r--r-- | security/vuxml/vuln.xml | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index de22bf2fcf17..60621bc911c3 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -68619,7 +68619,7 @@ affected..</p> driver to dereference an invalid pointer.</p> <p>Although this has not been confirmed, the possibility that an attacker may be able to execute arbitrary code in kernel - context can not be ruled out.</p> + context cannot be ruled out.</p> </body> </description> <references> @@ -79852,7 +79852,7 @@ executed in your Internet Explorer while displaying the email.</p> <p>Problem description:</p> <blockquote cite="http://security.freebsd.org/advisories/FreeBSD-SA-12:02.crypt.asc"> <p>There is a programming error in the DES implementation used in crypt() - when handling input which contains characters that can not be represented + when handling input which contains characters that cannot be represented with 7-bit ASCII.</p> <p>When the input contains characters with only the most significant bit set (0x80), that character and all characters after it will be ignored.</p> @@ -89842,7 +89842,7 @@ executed in your Internet Explorer while displaying the email.</p> being too small, allowing it to be overwritten. The impact of this programming error is that MaraDNS can be crashed by sending MaraDNS a single "packet of death". Since the data placed in the - overwritten array can not be remotely controlled (it is a list of + overwritten array cannot be remotely controlled (it is a list of increasing integers), there is no way to increase privileges exploiting this bug.</p> </blockquote> @@ -115625,7 +115625,7 @@ executed in your Internet Explorer while displaying the email.</p> RealMedia RTSP streams. When checking for matching asm rules, the code stores the results in a fixed-size array, but no boundary checks are performed. This may lead to a buffer overflow if the user is tricked - into connecting to a malicious server. Since the attacker can not write + into connecting to a malicious server. Since the attacker cannot write arbitrary data into the buffer, creating an exploit is very hard; but a DoS attack is easily made. A fix for this problem was committed to SVN on Sun Dec 31 13:27:53 2006 |