diff options
author | Xin LI <delphij@FreeBSD.org> | 2007-08-21 17:20:28 +0000 |
---|---|---|
committer | Xin LI <delphij@FreeBSD.org> | 2007-08-21 17:20:28 +0000 |
commit | 18567a346b8545b6c10c1c1a64d9a563505e8cfd (patch) | |
tree | 15775d27738baa3fbd64705f1fa232ec0f96febb | |
parent | 23023fa01bf42def13ebf9511f76966cb8c0126a (diff) | |
download | freebsd-ports-18567a346b8545b6c10c1c1a64d9a563505e8cfd.zip |
Document rsync off-by-one stack overflow vulnerability.
-rw-r--r-- | security/vuxml/vuln.xml | 30 |
1 files changed, 30 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 53e013d16edd..e3914afa3a7c 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,36 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="af8e3a0c-5009-11dc-8a43-003048705d5a"> + <topic>rsync -- off by one stack overflow</topic> + <affects> + <package> + <name>rsync</name> + <range><gt>0</gt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>BugTraq reports:</p> + <blockquote cite="http://www.securityfocus.com/bid/25336/discuss"> + <p>The rsync utility is prone to an off-by-one buffer-overflow + vulnerability. This issue is due to a failure of the application + to properly bounds-check user-supplied input.</p> + <p>Successfully exploiting this issue may allow arbitrary + code-execution in the context of the affected utility.</p> + </blockquote> + </body> + </description> + <references> + <bid>25336</bid> + <cvename>CVE-2007-4091</cvename> + </references> + <dates> + <discovery>2007-08-15</discovery> + <entry>2007-08-21</entry> + </dates> + </vuln> + <vuln vid="df4a7d21-4b17-11dc-9fc2-001372ae3ab9"> <topic>opera -- Vulnerability in javascript handling</topic> <affects> |