aboutsummaryrefslogtreecommitdiff
path: root/ports-mgmt
diff options
context:
space:
mode:
authorSimon L. B. Nielsen <simon@FreeBSD.org>2008-11-30 21:54:20 +0000
committerSimon L. B. Nielsen <simon@FreeBSD.org>2008-11-30 21:54:20 +0000
commitad0cd568d73f8ff3382772ec47de8e2b2664af1c (patch)
treeaa1ffeea5bd1937db8a00a66ff6344787ddaa473 /ports-mgmt
parentc82fdf4ec3460234f01c9e8455d4d380fe1752db (diff)
downloadports-ad0cd568d73f8ff3382772ec47de8e2b2664af1c.tar.gz
ports-ad0cd568d73f8ff3382772ec47de8e2b2664af1c.zip
Remove entry 2de14f7a-dad9-11d8-b59a-00061bc2ad93 (Multiple
Potential Buffer Overruns in Samba) which is duplicated from vuln.xml. I don't know why this entry is duplicated here, but I suspect it's related to portaudit.txt. By removing the entry from here, the entry in vuln.xml should just be used instead. PR: ports/129240 Reported by: Eygene Ryabinkin <rea-fbsd@codelabs.ru>
Notes
Notes: svn path=/head/; revision=223645
Diffstat (limited to 'ports-mgmt')
-rw-r--r--ports-mgmt/portaudit-db/database/portaudit.xlist1
-rw-r--r--ports-mgmt/portaudit-db/database/portaudit.xml45
2 files changed, 0 insertions, 46 deletions
diff --git a/ports-mgmt/portaudit-db/database/portaudit.xlist b/ports-mgmt/portaudit-db/database/portaudit.xlist
index 034472c025f7..cc5e0be1d85c 100644
--- a/ports-mgmt/portaudit-db/database/portaudit.xlist
+++ b/ports-mgmt/portaudit-db/database/portaudit.xlist
@@ -6,7 +6,6 @@
78348ea2-ec91-11d8-b913-000c41e2cdad
641859e8-eca1-11d8-b913-000c41e2cdad
603fe36d-ec9d-11d8-b913-000c41e2cdad
-2de14f7a-dad9-11d8-b59a-00061bc2ad93
7a9d5dfe-c507-11d8-8898-000d6111a684
3a408f6f-9c52-11d8-9366-0020ed76ef5a
e5e2883d-ceb9-11d8-8898-000d6111a684
diff --git a/ports-mgmt/portaudit-db/database/portaudit.xml b/ports-mgmt/portaudit-db/database/portaudit.xml
index 61aac6d73564..f72051fa9a08 100644
--- a/ports-mgmt/portaudit-db/database/portaudit.xml
+++ b/ports-mgmt/portaudit-db/database/portaudit.xml
@@ -282,51 +282,6 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
</dates>
</vuln>
- <vuln vid="2de14f7a-dad9-11d8-b59a-00061bc2ad93">
- <topic>Multiple Potential Buffer Overruns in Samba</topic>
- <affects>
- <package>
- <name>samba</name>
- <range><ge>3.*</ge><lt>3.0.5,1</lt></range>
- <range><lt>2.2.10</lt></range>
- </package>
- <package>
- <name>ja-samba</name>
- <range><lt>2.2.10.*</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Evgeny Demidov discovered that the Samba server has a
- buffer overflow in the Samba Web Administration Tool (SWAT)
- on decoding Base64 data during HTTP Basic Authentication.
- Versions 3.0.2 through 3.0.4 are affected.</p>
- <p>Another buffer overflow bug has been found in the code
- used to support the "mangling method = hash" smb.conf
- option. The default setting for this parameter is "mangling
- method = hash2" and therefore not vulnerable. Versions
- between 2.2.0 through 2.2.9 and 3.0.0 through 3.0.4 are affected.
- </p>
- </body>
- </description>
- <references>
- <cvename>CAN-2004-0600</cvename>
- <cvename>CAN-2004-0686</cvename>
- <mlist msgid="web-53121174@cgp.agava.net">http://www.securityfocus.com/archive/1/369698</mlist>
- <mlist msgid="200407222031.25086.bugtraq@beyondsecurity.com">http://www.securityfocus.com/archive/1/369706</mlist>
- <url>http://www.samba.org/samba/whatsnew/samba-3.0.5.html</url>
- <url>http://www.samba.org/samba/whatsnew/samba-2.2.10.html</url>
- <url>http://www.osvdb.org/8190</url>
- <url>http://www.osvdb.org/8191</url>
- <url>http://secunia.com/advisories/12130</url>
- </references>
- <dates>
- <discovery>2004-07-14</discovery>
- <entry>2004-07-21</entry>
- <modified>2004-07-22</modified>
- </dates>
- </vuln>
-
<vuln vid="7a9d5dfe-c507-11d8-8898-000d6111a684">
<topic>isc-dhcp3-server buffer overflow in logging mechanism</topic>
<affects>