diff options
author | Fernando ApesteguĂa <fernape@FreeBSD.org> | 2022-11-08 16:29:21 +0000 |
---|---|---|
committer | Fernando ApesteguĂa <fernape@FreeBSD.org> | 2022-11-08 16:30:57 +0000 |
commit | bbe3b93c5dcb484cef6ecf4fdabfeff7e64d3737 (patch) | |
tree | 48917e504fbf9be6a085d664dce4f26476e160f8 | |
parent | e1b120831a718fd36f043839f8a234769c521591 (diff) | |
download | ports-bbe3b93c5dcb484cef6ecf4fdabfeff7e64d3737.tar.gz ports-bbe3b93c5dcb484cef6ecf4fdabfeff7e64d3737.zip |
security/vuxml: register darkhttpd DoS vulnerability
PR: 267507
Reported by: Henrich Hartzer <henrichhartzer@tuta.io>
Security: CVE-2020-25691
-rw-r--r-- | security/vuxml/vuln-2022.xml | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml index b975f91f1291..e13d7d8ed980 100644 --- a/security/vuxml/vuln-2022.xml +++ b/security/vuxml/vuln-2022.xml @@ -1,3 +1,34 @@ + <vuln vid="9c399521-5f80-11ed-8ac4-b42e991fc52e"> + <topic>darkhttpd -- DOS vulnerability</topic> + <affects> + <package> + <name>darkhttpd</name> + <range><lt>1.14</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Mitre reports:</p> + <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25691"> + <p> + flaw was found in darkhttpd. Invalid error handling allows + remote attackers to cause denial-of-service by accessing a + file with a large modification date. The highest threat + from this vulnerability is to system availability. + </p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2020-25691</cvename> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25691</url> + </references> + <dates> + <discovery>2020-11-02</discovery> + <entry>2022-11-08</entry> + </dates> + </vuln> + <vuln vid="3310014a-5ef9-11ed-812b-206a8a720317"> <topic>sudo -- Potential out-of-bounds write for small passwords</topic> <affects> |