summaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authornectar <nectar@FreeBSD.org>2004-03-28 19:59:46 +0000
committernectar <nectar@FreeBSD.org>2004-03-28 19:59:46 +0000
commitfe69b078ad2098cc50458d6d351a1f64791535ef (patch)
tree677c684fbbd1a16fc3017299d4c2e93102d4e43d /security
parentdd31f30fb4bfd706bacfc4447f4f75b86b40b5f0 (diff)
downloadFreeBSD-ports-fe69b078ad2098cc50458d6d351a1f64791535ef.zip
FreeBSD-ports-fe69b078ad2098cc50458d6d351a1f64791535ef.tar.gz
Fix a botched version number (the package name was erroneously included).
Add another phpbb vulnerability. [1] Add oftpd denial-of-services. [2] Submitted by: Frankye Fattarelli <frankye@ipv5.net> [1] Reported by: Shane Kerr <shane@time-travellers.org> (oftpd author) [2]
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml52
1 files changed, 51 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 1dca91b..9b53ab1 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,55 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
"http://www.vuxml.org/dtd/vuxml-1/vuxml-10.dtd">
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="290d81b9-80f1-11d8-9645-0020ed76ef5a">
+ <topic>oftpd denial-of-service vulnerability (PORT command)</topic>
+ <affects>
+ <package>
+ <name>oftpd</name>
+ <range><lt>0.3.7</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Philippe Oechslin reported a denial-of-service vulnerability
+ in oftpd. The oftpd server can be crashed by sending a PORT
+ command containing an integer over 8 bits long (over 255).</p>
+ </body>
+ </description>
+ <references>
+ <url>http://www.time-travellers.org/oftpd/oftpd-dos.html</url>
+ </references>
+ <dates>
+ <discovery>2004-03-04</discovery>
+ <entry>2004-03-28</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="70f5b3c6-80f0-11d8-9645-0020ed76ef5a">
+ <topic>Critical SQL injection in phpBB</topic>
+ <affects>
+ <package>
+ <name>phpbb</name>
+ <range><le>2.0.8</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Anyone can get admin's username and password's md5 hash via a
+ single web request.
+ A working example is provided in the advisory.</p>
+ </body>
+ </description>
+ <references>
+ <url>http://marc.theaimsgroup.com/?l=bugtraq&amp;m=108032454818873</url>
+ </references>
+ <dates>
+ <discovery>2004-03-28</discovery>
+ <entry>2004-03-26</entry>
+ </dates>
+ </vuln>
+
+
<vuln vid="cdf18ed9-7f4a-11d8-9645-0020ed76ef5a">
<topic>multiple vulnerabilities in ethereal</topic>
<affects>
@@ -412,7 +461,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
<affects>
<package>
<name>apache</name>
- <range><ge>2.0</ge><le>apache-2.0.48_3</le></range>
+ <range><ge>2.0</ge><le>2.0.48_3</le></range>
</package>
</affects>
<description>
@@ -436,6 +485,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
<dates>
<discovery>2004-02-20</discovery>
<entry>2004-03-08</entry>
+ <modified>2004-03-28</modified>
</dates>
</vuln>
OpenPOWER on IntegriCloud