summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJacques Vidrine <nectar@FreeBSD.org>2004-03-06 19:06:20 +0000
committerJacques Vidrine <nectar@FreeBSD.org>2004-03-06 19:06:20 +0000
commitbff9fd02d597d61cf1670cde9be06e18fe3c8b86 (patch)
treef0ff0a3bea716be22ed05383be85944945cb6f23
parentAdd linux-XFree86-libs (diff)
chronological sort
Notes
Notes: svn path=/head/; revision=103127
-rw-r--r--security/vuxml/vuln.xml74
1 files changed, 37 insertions, 37 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index ab8c3bd27068..4f6a61adf2b8 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,43 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
"http://www.vuxml.org/dtd/vuxml-1/vuxml-10.dtd">
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="3837f462-5d6b-11d8-80e3-0020ed76ef5a">
+ <topic>Buffer overflows in XFree86 servers</topic>
+ <affects>
+ <package>
+ <name>XFree86-Server</name>
+ <range><le>4.3.0_13</le></range>
+ <range><ge>4.3.99</ge><le>4.3.99.15_1</le></range>
+ </package>
+ <package>
+ <name>linux-XFree86-libs</name>
+ <range><le>4.3.0_2</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>A number of buffer overflows were recently discovered in
+ XFree86, prompted by initial discoveries by iDEFENSE. These
+ buffer overflows are present in the font alias handling. An
+ attacker with authenticated access to a running X server may
+ exploit these vulnerabilities to obtain root privileges on
+ the machine running the X server.</p>
+ </body>
+ </description>
+ <references>
+ <url>http://www.idefense.com/application/poi/display?id=72</url>
+ <url>http://www.idefense.com/application/poi/display?id=73</url>
+ <cvename>CAN-2004-0083</cvename>
+ <cvename>CAN-2004-0084</cvename>
+ <cvename>CAN-2004-0106</cvename>
+ </references>
+ <dates>
+ <discovery>2004-02-10</discovery>
+ <entry>2004-02-12</entry>
+ <modified>2004-03-06</modified>
+ </dates>
+ </vuln>
+
<vuln vid="ac4b9d18-67a9-11d8-80e3-0020ed76ef5a">
<topic>fetchmail denial-of-service vulnerability</topic>
<affects>
@@ -480,43 +517,6 @@ misc.c:
</dates>
</vuln>
- <vuln vid="3837f462-5d6b-11d8-80e3-0020ed76ef5a">
- <topic>Buffer overflows in XFree86 servers</topic>
- <affects>
- <package>
- <name>XFree86-Server</name>
- <range><le>4.3.0_13</le></range>
- <range><ge>4.3.99</ge><le>4.3.99.15_1</le></range>
- </package>
- <package>
- <name>linux-XFree86-libs</name>
- <range><le>4.3.0_2</le></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>A number of buffer overflows were recently discovered in
- XFree86, prompted by initial discoveries by iDEFENSE. These
- buffer overflows are present in the font alias handling. An
- attacker with authenticated access to a running X server may
- exploit these vulnerabilities to obtain root privileges on
- the machine running the X server.</p>
- </body>
- </description>
- <references>
- <url>http://www.idefense.com/application/poi/display?id=72</url>
- <url>http://www.idefense.com/application/poi/display?id=73</url>
- <cvename>CAN-2004-0083</cvename>
- <cvename>CAN-2004-0084</cvename>
- <cvename>CAN-2004-0106</cvename>
- </references>
- <dates>
- <discovery>2004-02-10</discovery>
- <entry>2004-02-12</entry>
- <modified>2004-03-06</modified>
- </dates>
- </vuln>
-
<vuln vid="87cc48fd-5fdd-11d8-80e3-0020ed76ef5a">
<topic>mnGoSearch buffer overflow in UdmDocToTextBuf()</topic>
<affects>