diff options
author | Josef El-Rayes <josef@FreeBSD.org> | 2004-10-27 21:11:09 +0000 |
---|---|---|
committer | Josef El-Rayes <josef@FreeBSD.org> | 2004-10-27 21:11:09 +0000 |
commit | 5c18a76486d0923bccac4b5b253df79310516bb9 (patch) | |
tree | cdb3f192517e79731c404ce588c1a7a71f0702bb /security/vuxml/vuln.xml | |
parent | - Update to 0.23 (diff) |
Document rssh format string vulnerability.
Approved by: nectar
Diffstat (limited to '')
-rw-r--r-- | security/vuxml/vuln.xml | 26 |
1 files changed, 26 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index de2051a7c71b..f848797f9432 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,32 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="1f826757-26be-11d9-ad2d-0050fc56d258"> + <topic>rssh -- format string vulnerability</topic> + <affects> + <package> + <name>rssh</name> + <range><le>2.2.1</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>There is a format string bug in rssh that enables an attacker + to execute arbitrary code from an account configured to use + rssh. On FreeBSD it is only possible to compromise the rssh + running account, not root.</p> + </body> + </description> + <references> + <url>http://www.pizzashack.org/rssh/security.shtml</url> + <mlist msgid="20041023084829.GA16819@sophic.org">http://marc.theaimsgroup.com/?l=bugtraq&m=109855982425122</mlist> + </references> + <dates> + <discovery>2004-10-23</discovery> + <entry>2004-10-25</entry> + </dates> + </vuln> + <vuln vid="ed1d404d-2784-11d9-b954-000bdb1444a4"> <topic>horde -- cross-site scripting vulnerability in help window</topic> |