From 8475635cd8c4dd6af47018193261aca2a7ff541e Mon Sep 17 00:00:00 2001 From: Josef El-Rayes Date: Thu, 25 Nov 2004 13:38:59 +0000 Subject: Document vulnerability in ftp/prozilla. Submitted by: Niels Heinen --- security/vuxml/vuln.xml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) (limited to 'security/vuxml/vuln.xml') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 131ffe4d7969..d277772c87bc 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,33 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> + + ProZilla -- server response buffer overflow vulnerabilities + + + prozilla + 1.3.6_3 + + + + +

Buffer overflow vulnerabilities have been reported to exist + in this software package. The vulnerabilities can be triggered by + a remote server and can be used to inject malicious code in the + ProZilla process.

+ +
+ + http://www.gentoo.org/security/en/glsa/glsa-200411-31.xml + http://bugs.gentoo.org/show_bug.cgi?id=70090 + http://marc.theaimsgroup.com/?l=bugtraq&m=110136626320497 + + + 2004-11-23 + 2004-11-25 + +
+ Cyrus IMAPd -- APPEND command uses undefined programming construct -- cgit v1.2.3