summaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authornectar <nectar@FreeBSD.org>2004-03-11 12:41:06 +0000
committernectar <nectar@FreeBSD.org>2004-03-11 12:41:06 +0000
commit347140b035c3402ba031cc6fb9671a1ffa8412c3 (patch)
treec28e658efde1aabacc5277c2127a23e53a592519 /security
parent47ac3d38896e24399279d71d6a51935b5f6991ce (diff)
downloadFreeBSD-ports-347140b035c3402ba031cc6fb9671a1ffa8412c3.zip
FreeBSD-ports-347140b035c3402ba031cc6fb9671a1ffa8412c3.tar.gz
Delete duplicated mod_python entry, merging additional information into
previous entry.
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml45
1 files changed, 8 insertions, 37 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 4fb9891..94d5aea 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,24 +32,24 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
"http://www.vuxml.org/dtd/vuxml-1/vuxml-10.dtd">
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
- <vuln vid="1ed556e6-734f-11d8-868e-000347dd607f">
- <topic>mod_python denial of service vulnerability</topic>
+ <vuln vid="1a448eb7-6988-11d8-873f-0020ed76ef5a">
+ <topic>mod_python denial-of-service vulenerability in parse_qs</topic>
<affects>
<package>
- <name>mod_python</name>
- <range><ge>2.7.0</ge><lt>2.7.10</lt></range>
- <range><ge>3.0.0</ge><lt>3.0.4</lt></range>
+ <name>mod_python</name>
+ <range><ge>2.7</ge><lt>2.7.10</lt></range>
+ <range><ge>3.0</ge><lt>3.0.4</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>The Apache Software Foundation reports that a specific
- query string processed by mod_python would cause the
- httpd process to crash.</p>
+ <p>An attacker may cause Apache with mod_python to crash
+ by using a specially constructed query string.</p>
</body>
</description>
<references>
<cvename>CAN-2003-0973</cvename>
+ <bid>9129</bid>
<url>http://www.modpython.org/pipermail/mod_python/2003-November/014532.html</url>
<url>http://www.modpython.org/pipermail/mod_python/2004-January/014879.html</url>
</references>
@@ -397,35 +397,6 @@ misc.c:
</dates>
</vuln>
- <vuln vid="1a448eb7-6988-11d8-873f-0020ed76ef5a">
- <topic>mod_python denial-of-service vulenerability in parse_qs</topic>
- <affects>
- <package>
- <name>mod_python</name>
- <range><lt>2.7.10</lt></range>
- <range><lt>3.0.4</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>An attacker may cause Apache with mod_python to crash
- by using a specially constructed query string.</p>
- <p><em>Note:</em> It was announced that this bug was fixed in
- mod_python 2.7.9 also. However, there are only changes in
- documentation between 2.7.8 and 2.7.9.</p>
- </body>
- </description>
- <references>
- <cvename>CAN-2003-0973</cvename>
- <bid>9129</bid>
- <url>http://www.modpython.org/pipermail/mod_python/2003-November/014532.html</url>
- </references>
- <dates>
- <discovery>2003-11-28</discovery>
- <entry>2004-03-03</entry>
- </dates>
- </vuln>
-
<vuln vid="b0e76877-67a8-11d8-80e3-0020ed76ef5a">
<topic>mailman denial-of-service vulnerability in
MailCommandHandler</topic>
OpenPOWER on IntegriCloud