summaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
authorMartin Wilke <miwi@FreeBSD.org>2007-06-09 17:46:22 +0000
committerMartin Wilke <miwi@FreeBSD.org>2007-06-09 17:46:22 +0000
commitc3ae8a8590602b26b56a89dd2e3075321a7c07b6 (patch)
treeb6b6a236b29ef63f199005b3fe195ad64e3990f8 /security/vuxml/vuln.xml
parent- Fix duplicate entry de-wordpress -> zh-wordpress. (diff)
- Document c-ares -- DNS Cache Poisoning Vulnerability
Reviewed by: simon@
Notes
Notes: svn path=/head/; revision=193113
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml29
1 files changed, 29 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 7dc5bff8b839..340a60530261 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,35 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="70ae62b0-16b0-11dc-b803-0016179b2dd5">
+ <topic>c-ares -- DNS Cache Poisoning Vulnerability</topic>
+ <affects>
+ <package>
+ <name>c-ares</name>
+ <range><lt>1.4.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>secunia reports:</p>
+ <blockquote cite="http://secunia.com/advisories/25579/">
+ <p>The vulnerability is caused due to predictable
+ DNS "Transaction ID" field in DNS queries and can
+ be exploited to poison the DNS cache of an application
+ using the library if a valid ID is guessed.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://secunia.com/advisories/25579/</url>
+ <url>http://cool.haxx.se/cvs.cgi/curl/ares/CHANGES?rev=HEAD&amp;content-type=text/vnd.viewcvs-markup</url>
+ </references>
+ <dates>
+ <discovery>2007-06-08</discovery>
+ <entry>2007-06-09</entry>
+ </dates>
+ </vuln>
+
<vuln vid="0838733d-1698-11dc-a197-0011098b2f36">
<topic>wordpress -- XMLRPC SQL Injection</topic>
<affects>