diff options
author | nectar <nectar@FreeBSD.org> | 2004-03-06 19:06:20 +0000 |
---|---|---|
committer | nectar <nectar@FreeBSD.org> | 2004-03-06 19:06:20 +0000 |
commit | 51dd4d419fa094a59e37c4be0eb765141c1ec6cf (patch) | |
tree | 63aebb293bd200a52813ddbdc7eaca281649b671 /security | |
parent | b61fe8c6d47aa7935087d87338a669076cf79138 (diff) | |
download | FreeBSD-ports-51dd4d419fa094a59e37c4be0eb765141c1ec6cf.zip FreeBSD-ports-51dd4d419fa094a59e37c4be0eb765141c1ec6cf.tar.gz |
chronological sort
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 74 |
1 files changed, 37 insertions, 37 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index ab8c3bd..4f6a61a 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,43 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. "http://www.vuxml.org/dtd/vuxml-1/vuxml-10.dtd"> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="3837f462-5d6b-11d8-80e3-0020ed76ef5a"> + <topic>Buffer overflows in XFree86 servers</topic> + <affects> + <package> + <name>XFree86-Server</name> + <range><le>4.3.0_13</le></range> + <range><ge>4.3.99</ge><le>4.3.99.15_1</le></range> + </package> + <package> + <name>linux-XFree86-libs</name> + <range><le>4.3.0_2</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>A number of buffer overflows were recently discovered in + XFree86, prompted by initial discoveries by iDEFENSE. These + buffer overflows are present in the font alias handling. An + attacker with authenticated access to a running X server may + exploit these vulnerabilities to obtain root privileges on + the machine running the X server.</p> + </body> + </description> + <references> + <url>http://www.idefense.com/application/poi/display?id=72</url> + <url>http://www.idefense.com/application/poi/display?id=73</url> + <cvename>CAN-2004-0083</cvename> + <cvename>CAN-2004-0084</cvename> + <cvename>CAN-2004-0106</cvename> + </references> + <dates> + <discovery>2004-02-10</discovery> + <entry>2004-02-12</entry> + <modified>2004-03-06</modified> + </dates> + </vuln> + <vuln vid="ac4b9d18-67a9-11d8-80e3-0020ed76ef5a"> <topic>fetchmail denial-of-service vulnerability</topic> <affects> @@ -480,43 +517,6 @@ misc.c: </dates> </vuln> - <vuln vid="3837f462-5d6b-11d8-80e3-0020ed76ef5a"> - <topic>Buffer overflows in XFree86 servers</topic> - <affects> - <package> - <name>XFree86-Server</name> - <range><le>4.3.0_13</le></range> - <range><ge>4.3.99</ge><le>4.3.99.15_1</le></range> - </package> - <package> - <name>linux-XFree86-libs</name> - <range><le>4.3.0_2</le></range> - </package> - </affects> - <description> - <body xmlns="http://www.w3.org/1999/xhtml"> - <p>A number of buffer overflows were recently discovered in - XFree86, prompted by initial discoveries by iDEFENSE. These - buffer overflows are present in the font alias handling. An - attacker with authenticated access to a running X server may - exploit these vulnerabilities to obtain root privileges on - the machine running the X server.</p> - </body> - </description> - <references> - <url>http://www.idefense.com/application/poi/display?id=72</url> - <url>http://www.idefense.com/application/poi/display?id=73</url> - <cvename>CAN-2004-0083</cvename> - <cvename>CAN-2004-0084</cvename> - <cvename>CAN-2004-0106</cvename> - </references> - <dates> - <discovery>2004-02-10</discovery> - <entry>2004-02-12</entry> - <modified>2004-03-06</modified> - </dates> - </vuln> - <vuln vid="87cc48fd-5fdd-11d8-80e3-0020ed76ef5a"> <topic>mnGoSearch buffer overflow in UdmDocToTextBuf()</topic> <affects> |