diff options
author | Jacques Vidrine <nectar@FreeBSD.org> | 2004-02-12 15:01:48 +0000 |
---|---|---|
committer | Jacques Vidrine <nectar@FreeBSD.org> | 2004-02-12 15:01:48 +0000 |
commit | b2fb1661b84f51fe91e6fd2f2947fc59e1dc919d (patch) | |
tree | dedf8ba5b405f00ddcd617a98f6ee1624f8c1390 | |
parent | Add missing `<p>'s in Apache-SSL entry. (diff) |
Note XFree86 server buffer overflows.
Notes
Notes:
svn path=/head/; revision=100768
-rw-r--r-- | security/vuxml/vuln.xml | 33 |
1 files changed, 33 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 2d4cfa5686c0..4f2ed2a54926 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,39 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. "http://www.vuxml.org/dtd/vuxml-1/vuxml-10.dtd"> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + + <vuln vid="3837f462-5d6b-11d8-80e3-0020ed76ef5a"> + <topic>Buffer overflows in XFree86 servers</topic> + <affects> + <package> + <name>XFree86-Server</name> + <range><le>4.3.0_13</le></range> + <range><ge>4.3.99</ge><le>4.3.99.15_1</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>A number of buffer overflows were recently discovered in + XFree86, prompted by initial discoveries by iDEFENSE. These + buffer overflows are present in the font alias handling. An + attacker with authenticated access to a running X server may + exploit these vulnerabilities to obtain root privileges on + the machine running the X server.</p> + </body> + </description> + <references> + <url>http://www.idefense.com/application/poi/display?id=72</url> + <url>http://www.idefense.com/application/poi/display?id=73</url> + <cvename>CAN-2004-0083</cvename> + <cvename>CAN-2004-0084</cvename> + <cvename>CAN-2004-0106</cvename> + </references> + <dates> + <discovery>2004/02/10</discovery> + <entry>2004/02/12</entry> + </dates> + </vuln> + <vuln vid="67c05283-5d62-11d8-80e3-0020ed76ef5a"> <topic>Buffer overflow in Mutt 1.4</topic> <affects> |