aboutsummaryrefslogtreecommitdiff
path: root/ports-mgmt
diff options
context:
space:
mode:
authorClement Laforet <clement@FreeBSD.org>2004-02-11 18:28:18 +0000
committerClement Laforet <clement@FreeBSD.org>2004-02-11 18:28:18 +0000
commit88f171bfd3fb2881f98baf73a7ab037e2a4cb510 (patch)
tree741718971663dec71ab5c28b28f2c0cc004f10b4 /ports-mgmt
parent40b77fe1e29da47e01b7d82b99f05c78dd214c1c (diff)
downloadports-88f171bfd3fb2881f98baf73a7ab037e2a4cb510.tar.gz
ports-88f171bfd3fb2881f98baf73a7ab037e2a4cb510.zip
Add mutt < 1.4.2 vulnerabilty.
Notes
Notes: svn path=/head/; revision=100697
Diffstat (limited to 'ports-mgmt')
-rw-r--r--ports-mgmt/portaudit/database/auditfile.txt1
1 files changed, 1 insertions, 0 deletions
diff --git a/ports-mgmt/portaudit/database/auditfile.txt b/ports-mgmt/portaudit/database/auditfile.txt
index d75ff83ba501..3495703868b5 100644
--- a/ports-mgmt/portaudit/database/auditfile.txt
+++ b/ports-mgmt/portaudit/database/auditfile.txt
@@ -37,3 +37,4 @@ ru-apache+mod_ssl>=1.3<1.3.29|http://www.apacheweek.com/features/security-13|Mul
clamav<0.65_7|http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/62586|remote exploitable DOS vulnerability
apache+ssl>=1.3<1.3.29.1.53|http://www.apache-ssl.org/advisory-20040206.txt|optional client certificate vulnerability
monkey<0.8.2|http://monkeyd.sourceforge.net/|DoS bug caused by get_real_string()
+mutt<1.4.2|http://www.securityfocus.com/archive/1/353428/2004-02-08/2004-02-14/0|buffer overflow that can be triggered by incoming messages