summaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
authorChristian Weisgerber <naddy@FreeBSD.org>2006-03-04 15:03:46 +0000
committerChristian Weisgerber <naddy@FreeBSD.org>2006-03-04 15:03:46 +0000
commitd3926c182d91fcef36d3263b6daf4e81c4af0fae (patch)
treec8f257911721b9eabfbd48d84fee976e07241ab9 /security/vuxml/vuln.xml
parentFix a buffer overflow, caused by improper bounds checking of the (diff)
Document GNU tar invalid headers buffer overflow.
Approved by: portmgr (erwin)
Notes
Notes: svn path=/head/; revision=156953
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml27
1 files changed, 27 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 38686c238fd7..fe382211dbaf 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,33 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="6107efb9-aae3-11da-aea1-000854d03344">
+ <topic>gtar -- invalid headers buffer overflow</topic>
+ <affects>
+ <package>
+ <name>gtar</name>
+ <range><lt>1.15.1_2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>GNU tar is vulnerable to a buffer overflow, caused by
+ improper bounds checking of the PAX extended headers. By
+ tricking an user into processing a specially crafted tar
+ archive, this could be exploited to execute arbitrary
+ code with the privileges of the user.</p>
+ </body>
+ </description>
+ <references>
+ <bid>16764</bid>
+ <cvename>CVE-2006-0300</cvename>
+ </references>
+ <dates>
+ <discovery>2006-02-22</discovery>
+ <entry>2006-03-03</entry>
+ </dates>
+ </vuln>
+
<vuln vid="46f7b598-a781-11da-906a-fde5cdde365e">
<topic>bugzilla -- multiple vulnerability</topic>
<affects>