summaryrefslogtreecommitdiffstats
path: root/security/portaudit-db/database
diff options
context:
space:
mode:
authoreik <eik@FreeBSD.org>2004-06-12 22:43:44 +0000
committereik <eik@FreeBSD.org>2004-06-12 22:43:44 +0000
commit1441202676dc8d14aff5c58bd9a3cd635d772894 (patch)
tree4818cf2688bb47f079d519021512402d2e5506df /security/portaudit-db/database
parent8d06ca2cb831e86d34dabdbc752ebcc914383f66 (diff)
downloadFreeBSD-ports-1441202676dc8d14aff5c58bd9a3cd635d772894.zip
FreeBSD-ports-1441202676dc8d14aff5c58bd9a3cd635d772894.tar.gz
portaudit-db generates a portaudit database from a current
ports tree. It also features a file `database/portaudit.txt' where UUIDs for vulnerabilities can be allocated quickly before they are moved to the VuXML database. Call `packaudit' after upgrading your ports tree.
Diffstat (limited to 'security/portaudit-db/database')
-rw-r--r--security/portaudit-db/database/portaudit.txt7
-rw-r--r--security/portaudit-db/database/portaudit.xlist4
-rw-r--r--security/portaudit-db/database/portaudit.xml69
3 files changed, 80 insertions, 0 deletions
diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt
new file mode 100644
index 0000000..7d3a72b
--- /dev/null
+++ b/security/portaudit-db/database/portaudit.txt
@@ -0,0 +1,7 @@
+# portaudit text based database
+# $FreeBSD$
+smtpproxy<=1.1.3|http://0xbadc0ded.org/advisories/0402.txt|remotely exploitable format string vulnerability|1abf65f9-bc9d-11d8-916c-000347dd607f
+apache<1.3.31_1|http://www.apacheweek.com/features/security-13|mod_proxy buffer overflow (CAN-2004-0492)|5bcd500c-bc9d-11d8-916c-000347dd607f
+apache+mod_ssl<1.3.31+2.8.18_3|http://www.apacheweek.com/features/security-13|mod_proxy buffer overflow (CAN-2004-0492)|5bcd500c-bc9d-11d8-916c-000347dd607f
+apache<2.0.49_1|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0488|mod_ssl stack-based buffer overflow|662cd99e-bc9d-11d8-916c-000347dd607f
+apache+mod_ssl*<1.3.31+2.8.18_4|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0488|mod_ssl stack-based buffer overflow|662cd99e-bc9d-11d8-916c-000347dd607f
diff --git a/security/portaudit-db/database/portaudit.xlist b/security/portaudit-db/database/portaudit.xlist
new file mode 100644
index 0000000..48700b5
--- /dev/null
+++ b/security/portaudit-db/database/portaudit.xlist
@@ -0,0 +1,4 @@
+# portaudit exclude list
+# $FreeBSD$
+3362f2c1-8344-11d8-a41f-0020ed76ef5a
+5e7f58c3-b3f8-4258-aeb8-795e5e940ff8
diff --git a/security/portaudit-db/database/portaudit.xml b/security/portaudit-db/database/portaudit.xml
new file mode 100644
index 0000000..ae616f4
--- /dev/null
+++ b/security/portaudit-db/database/portaudit.xml
@@ -0,0 +1,69 @@
+<?xml version="1.0" encoding="utf-8"?>
+<!--
+This file is in the public domain.
+ $FreeBSD$
+-->
+<!DOCTYPE vuxml PUBLIC "-//vuxml.org//DTD VuXML 1.1//EN" "http://www.vuxml.org/dtd/vuxml-1/vuxml-11.dtd">
+<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+
+ <vuln vid="42e330ab-82a4-11d8-868e-000347dd607f">
+ <topic>MPlayer remotely exploitable buffer overflow in the ASX parser</topic>
+ <affects>
+ <package>
+ <name>mplayer</name>
+ <name>mplayer-esound</name>
+ <name>mplayer-gtk</name>
+ <name>mplayer-gtk-esound</name>
+ <range><lt>0.92</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>A remotely exploitable buffer overflow vulnerability was found in
+ MPlayer. A malicious host can craft a harmful ASX header,
+ and trick MPlayer into executing arbitrary code upon parsing that header.</p>
+ </body>
+ </description>
+ <references>
+ <url>http://www.mplayerhq.hu/</url>
+ <url>http://www.securityfocus.com/archive/1/339330</url>
+ <url>http://www.securityfocus.com/archive/1/339193</url>
+ <cvename>CAN-2003-0835</cvename>
+ <bid>8702</bid>
+ </references>
+ <dates>
+ <discovery>2003-09-24</discovery>
+ <entry>2004-03-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="d8c46d74-8288-11d8-868e-000347dd607f">
+ <topic>MPlayer remotely exploitable buffer overflow in the HTTP parser</topic>
+ <affects>
+ <package>
+ <name>mplayer</name>
+ <name>mplayer-esound</name>
+ <name>mplayer-gtk</name>
+ <name>mplayer-gtk-esound</name>
+ <range><lt>0.92.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>A remotely exploitable buffer overflow vulnerability was found in
+ MPlayer. A malicious host can craft a harmful HTTP header (&quot;Location:&quot;),
+ and trick MPlayer into executing arbitrary code upon parsing that header.</p>
+ </body>
+ </description>
+ <references>
+ <url>http://www.mplayerhq.hu/</url>
+ <url>http://www.securityfocus.com/archive/1/359029</url>
+ <url>http://www.securityfocus.com/archive/1/359025</url>
+ </references>
+ <dates>
+ <discovery>2004-03-29</discovery>
+ <entry>2004-03-30</entry>
+ </dates>
+ </vuln>
+
+</vuxml>
OpenPOWER on IntegriCloud