diff options
author | nectar <nectar@FreeBSD.org> | 2004-03-31 20:33:24 +0000 |
---|---|---|
committer | nectar <nectar@FreeBSD.org> | 2004-03-31 20:33:24 +0000 |
commit | 33e0a62f77c5bc30e2fa6bfdb1b8ba772a98f67a (patch) | |
tree | 9586b4ac96078fa98c94955ed920646fc718d398 /security/vuxml | |
parent | 8d9d8876bf018f2c6a082c7f16570c4700c19c66 (diff) | |
download | FreeBSD-ports-33e0a62f77c5bc30e2fa6bfdb1b8ba772a98f67a.zip FreeBSD-ports-33e0a62f77c5bc30e2fa6bfdb1b8ba772a98f67a.tar.gz |
Add security issue affecting the Courier mail services.
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 52 |
1 files changed, 52 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 9870959..f3241b4 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -31,6 +31,58 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="98bd69c3-834b-11d8-a41f-0020ed76ef5a"> + <topic>Courier mail services: remotely exploitable buffer overflows</topic> + <affects> + <package> + <name>courier</name> + <range><lt>0.45</lt></range> + </package> + <package> + <name>courier-imap</name> + <range><lt>3.0</lt></range> + </package> + <package> + <name>sqwebmail</name> + <range><lt>4.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Courier set of mail services use a common Unicode + library. This library contains buffer overflows in the + converters for two popular Japanese character encodings. + These overflows may be remotely exploitable, triggered by + a maliciously formatted email message that is later processed + by one of the Courier mail services. + From the release notes for the corrected versions of the + Courier set of mail services:</p> + <blockquote> + <p>iso2022jp.c: Converters became (upper-)compatible with + ISO-2022-JP (RFC1468 / JIS X 0208:1997 Annex 2) and + ISO-2022-JP-1 (RFC2237). Buffer overflow vulnerability + (when Unicode character is out of BMP range) has been + closed. Convert error handling was implemented.</p> + <p>shiftjis.c: Broken SHIFT_JIS converters has been fixed + and became (upper-)compatible with Shifted Encoding Method + (JIS X 0208:1997 Annex 1). Buffer overflow vulnerability + (when Unicode character is out of BMP range) has been + closed. Convert error handling was implemented.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CAN-2004-0224</cvename> + <url>http://cvs.sourceforge.net/viewcvs.py/courier/libs/unicode/iso2022jp.c?rev=1.10&view=markup</url> + <url>http://cvs.sourceforge.net/viewcvs.py/courier/libs/unicode/shiftjis.c?rev=1.6&view=markup</url> + <bid>9845</bid> + </references> + <dates> + <discovery>2004-02-01</discovery> + <entry>2004-03-31</entry> + </dates> + </vuln> + <vuln vid="b7cb488c-8349-11d8-a41f-0020ed76ef5a"> <topic>isakmpd payload handling denial-of-service vulnerabilities</topic> <affects> |