summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorXin LI <delphij@FreeBSD.org>2007-08-21 17:20:28 +0000
committerXin LI <delphij@FreeBSD.org>2007-08-21 17:20:28 +0000
commit18567a346b8545b6c10c1c1a64d9a563505e8cfd (patch)
tree15775d27738baa3fbd64705f1fa232ec0f96febb
parent23023fa01bf42def13ebf9511f76966cb8c0126a (diff)
downloadfreebsd-ports-18567a346b8545b6c10c1c1a64d9a563505e8cfd.zip
Document rsync off-by-one stack overflow vulnerability.
-rw-r--r--security/vuxml/vuln.xml30
1 files changed, 30 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 53e013d16edd..e3914afa3a7c 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,36 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="af8e3a0c-5009-11dc-8a43-003048705d5a">
+ <topic>rsync -- off by one stack overflow</topic>
+ <affects>
+ <package>
+ <name>rsync</name>
+ <range><gt>0</gt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>BugTraq reports:</p>
+ <blockquote cite="http://www.securityfocus.com/bid/25336/discuss">
+ <p>The rsync utility is prone to an off-by-one buffer-overflow
+ vulnerability. This issue is due to a failure of the application
+ to properly bounds-check user-supplied input.</p>
+ <p>Successfully exploiting this issue may allow arbitrary
+ code-execution in the context of the affected utility.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>25336</bid>
+ <cvename>CVE-2007-4091</cvename>
+ </references>
+ <dates>
+ <discovery>2007-08-15</discovery>
+ <entry>2007-08-21</entry>
+ </dates>
+ </vuln>
+
<vuln vid="df4a7d21-4b17-11dc-9fc2-001372ae3ab9">
<topic>opera -- Vulnerability in javascript handling</topic>
<affects>