diff options
author | Jacques Vidrine <nectar@FreeBSD.org> | 2004-04-16 16:29:01 +0000 |
---|---|---|
committer | Jacques Vidrine <nectar@FreeBSD.org> | 2004-04-16 16:29:01 +0000 |
commit | 3eb8597bd7b50afe0acb65169dc5712d6ed1fa18 (patch) | |
tree | e8751468556592b48829149e8504df3b4ad3c701 /security/vuxml/vuln.xml | |
parent | 11758f81a7c4106629caf4e47fdf27fc0f2e9f2b (diff) | |
download | ports-3eb8597bd7b50afe0acb65169dc5712d6ed1fa18.tar.gz ports-3eb8597bd7b50afe0acb65169dc5712d6ed1fa18.zip |
Add mysqlbug temporary file handling vulnerability.
Add ident2 vulnerability.
make tidy (sorry, I meant to do this in a separate commit)
Notes
Notes:
svn path=/head/; revision=107250
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r-- | security/vuxml/vuln.xml | 238 |
1 files changed, 146 insertions, 92 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 4209e99d01d6..132ad35f9fd2 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -30,6 +30,62 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="2e129846-8fbb-11d8-8b29-0020ed76ef5a"> + <topic>MySQL insecure temporary file creation (mysqlbug)</topic> + <affects> + <package> + <name>mysql-client</name> + <range><gt>3.2</gt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Shaun Colley reports that the script `mysqlbug' included + with MySQL sometimes creates temporary files in an unsafe + manner. As a result, an attacker may create a symlink in + /tmp so that if another user invokes `mysqlbug' and <em>quits + without making <strong>any</strong> changes</em>, an + arbitrary file may be overwritten with the bug report + template.</p> + </body> + </description> + <references> + <url>http://marc.theaimsgroup.com/?l=bugtraq&m=108023246916294&w=2</url> + <bid>9976</bid> + <cvename>CAN-2004-0381</cvename> + </references> + <dates> + <discovery>2004-03-25</discovery> + <entry>2004-04-16</entry> + </dates> + </vuln> + + <vuln vid="99230277-8fb4-11d8-8b29-0020ed76ef5a"> + <topic>ident2 double byte buffer overflow</topic> + <affects> + <package> + <name>ident2</name> + <range><le>1.04</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Jack of RaptureSecurity reported a double byte buffer + overflow in ident2. The bug may allow a remote attacker to + execute arbitrary code within the context of the ident2 + daemon. The daemon typically runs as user-ID `nobody', but + with group-ID `wheel'.</p> + </body> + </description> + <references> + <url>http://cvsweb.freebsd.org/ports/security/ident2/files/patch-common.c</url> + </references> + <dates> + <discovery>2004-04-15</discovery> + <entry>2004-04-16</entry> + </dates> + </vuln> + <vuln vid="da6f265b-8f3d-11d8-8b29-0020ed76ef5a"> <topic>kdepim exploitable buffer overflow in VCF reader</topic> <affects> @@ -131,9 +187,54 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. </dates> </vuln> + <vuln vid="27c331d5-64c7-11d8-80e3-0020ed76ef5a"> + <topic>Vulnerabilities in H.323 implementations</topic> + <affects> + <package> + <name>pwlib</name> + <range><lt>1.6.0</lt></range> + </package> + <package> + <name>asterisk</name> + <range><le>0.7.2</le></range> + </package> + <package> + <name>openh323</name> + <range><lt>1.13.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The <a href="http://www.niscc.gov.uk/">NISCC</a> and the <a href="http://www.ee.oulu.fi/research/ouspg/">OUSPG</a> + developed a test suite for the H.323 protocol. This test + suite has uncovered vulnerabilities in several H.323 + implementations with impacts ranging from denial-of-service + to arbitrary code execution.</p> + <p>In the FreeBSD Ports Collection, `pwlib' is directly + affected. Other applications such as `asterisk' and + `openh323' incorporate `pwlib' statically and so are also + independently affected.</p> + </body> + </description> + <references> + <!-- General references --> + <url>http://www.uniras.gov.uk/vuls/2004/006489/h323.htm</url> + <url>http://www.ee.oulu.fi/research/ouspg/protos/testing/c07/h2250v4/index.html</url> + <certsa>CA-2004-01</certsa> + <certvu>749342</certvu> + <!-- pwlib and pwlib-using applications --> + <cvename>CAN-2004-0097</cvename> + <url>http://www.southeren.com/blog/archives/000055.html</url> + </references> + <dates> + <discovery>2004-01-13</discovery> + <entry>2004-02-22</entry> + <modified>2004-04-15</modified> + </dates> + </vuln> + <vuln vid="ccd698df-8e20-11d8-90d1-0020ed76ef5a"> - <topic>racoon remote denial of service vulnerability - (ISAKMP header length field)</topic> + <topic>racoon remote denial of service vulnerability (ISAKMP header length field)</topic> <affects> <package> <name>racoon</name> @@ -162,8 +263,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. </vuln> <vuln vid="40fcf20f-8891-11d8-90d1-0020ed76ef5a"> - <topic>racoon remote denial of service vulnerability (IKE Generic - Payload Header)</topic> + <topic>racoon remote denial of service vulnerability (IKE Generic Payload Header)</topic> <affects> <package> <name>racoon</name> @@ -188,6 +288,48 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. </dates> </vuln> + <vuln vid="f8551668-de09-4d7b-9720-f1360929df07"> + <topic>tcpdump ISAKMP payload handling remote denial-of-service</topic> + <affects> + <package> + <name>tcpdump</name> + <range><lt>3.8.3</lt></range> + </package> + <package> + <name>racoon</name> + <range><lt>20040408a</lt></range> + </package> + <system> + <name>FreeBSD</name> + <range><ge>0</ge></range> + </system> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Chad Loder has discovered vulnerabilities in tcpdump's + ISAKMP protocol handler. During an audit to repair these + issues, Bill Fenner discovered some related problems.</p> + <p>These vulnerabilities may be used by an attacker to crash a + running `tcpdump' process. They can only be triggered if + the `-v' command line option is being used.</p> + <p>NOTE: the racoon ISAKMP/IKE daemon incorporates the ISAKMP + protocol handler from tcpdump, and so is also affected by + this issue.</p> + </body> + </description> + <references> + <url>http://marc.theaimsgroup.com/?l=bugtraq&m=108067265931525</url> + <url>http://www.rapid7.com/advisories/R7-0017.html</url> + <cvename>CAN-2004-0183</cvename> + <cvename>CAN-2004-0184</cvename> + </references> + <dates> + <discovery>2004-03-12</discovery> + <entry>2004-03-31</entry> + <modified>2004-04-14</modified> + </dates> + </vuln> + <vuln vid="322d4ff6-85c3-11d8-a41f-0020ed76ef5a"> <topic>Midnight Commander buffer overflow during symlink resolution</topic> <affects> @@ -677,48 +819,6 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. </dates> </vuln> - <vuln vid="f8551668-de09-4d7b-9720-f1360929df07"> - <topic>tcpdump ISAKMP payload handling remote denial-of-service</topic> - <affects> - <package> - <name>tcpdump</name> - <range><lt>3.8.3</lt></range> - </package> - <package> - <name>racoon</name> - <range><lt>20040408a</lt></range> - </package> - <system> - <name>FreeBSD</name> - <range><ge>0</ge></range> - </system> - </affects> - <description> - <body xmlns="http://www.w3.org/1999/xhtml"> - <p>Chad Loder has discovered vulnerabilities in tcpdump's - ISAKMP protocol handler. During an audit to repair these - issues, Bill Fenner discovered some related problems.</p> - <p>These vulnerabilities may be used by an attacker to crash a - running `tcpdump' process. They can only be triggered if - the `-v' command line option is being used.</p> - <p>NOTE: the racoon ISAKMP/IKE daemon incorporates the ISAKMP - protocol handler from tcpdump, and so is also affected by - this issue.</p> - </body> - </description> - <references> - <url>http://marc.theaimsgroup.com/?l=bugtraq&m=108067265931525</url> - <url>http://www.rapid7.com/advisories/R7-0017.html</url> - <cvename>CAN-2004-0183</cvename> - <cvename>CAN-2004-0184</cvename> - </references> - <dates> - <discovery>2004-03-12</discovery> - <entry>2004-03-31</entry> - <modified>2004-04-14</modified> - </dates> - </vuln> - <vuln vid="705e003a-7f36-11d8-9645-0020ed76ef5a"> <topic>squid ACL bypass due to URL decoding bug</topic> <affects> @@ -1767,52 +1867,6 @@ misc.c: </dates> </vuln> - <vuln vid="27c331d5-64c7-11d8-80e3-0020ed76ef5a"> - <topic>Vulnerabilities in H.323 implementations</topic> - <affects> - <package> - <name>pwlib</name> - <range><lt>1.6.0</lt></range> - </package> - <package> - <name>asterisk</name> - <range><le>0.7.2</le></range> - </package> - <package> - <name>openh323</name> - <range><lt>1.13.0</lt></range> - </package> - </affects> - <description> - <body xmlns="http://www.w3.org/1999/xhtml"> - <p>The <a href="http://www.niscc.gov.uk/">NISCC</a> and the <a href="http://www.ee.oulu.fi/research/ouspg/">OUSPG</a> - developed a test suite for the H.323 protocol. This test - suite has uncovered vulnerabilities in several H.323 - implementations with impacts ranging from denial-of-service - to arbitrary code execution.</p> - <p>In the FreeBSD Ports Collection, `pwlib' is directly - affected. Other applications such as `asterisk' and - `openh323' incorporate `pwlib' statically and so are also - independently affected.</p> - </body> - </description> - <references> - <!-- General references --> - <url>http://www.uniras.gov.uk/vuls/2004/006489/h323.htm</url> - <url>http://www.ee.oulu.fi/research/ouspg/protos/testing/c07/h2250v4/index.html</url> - <certsa>CA-2004-01</certsa> - <certvu>749342</certvu> - <!-- pwlib and pwlib-using applications --> - <cvename>CAN-2004-0097</cvename> - <url>http://www.southeren.com/blog/archives/000055.html</url> - </references> - <dates> - <discovery>2004-01-13</discovery> - <entry>2004-02-22</entry> - <modified>2004-04-15</modified> - </dates> - </vuln> - <vuln vid="87cc48fd-5fdd-11d8-80e3-0020ed76ef5a"> <topic>mnGoSearch buffer overflow in UdmDocToTextBuf()</topic> <affects> |