summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--ports-mgmt/portaudit-db/database/portaudit.txt1
-rw-r--r--security/portaudit-db/database/portaudit.txt1
-rw-r--r--security/vuxml/vuln.xml27
3 files changed, 27 insertions, 2 deletions
diff --git a/ports-mgmt/portaudit-db/database/portaudit.txt b/ports-mgmt/portaudit-db/database/portaudit.txt
index f4233b127db8..22b1f9342a54 100644
--- a/ports-mgmt/portaudit-db/database/portaudit.txt
+++ b/ports-mgmt/portaudit-db/database/portaudit.txt
@@ -35,4 +35,3 @@ rssh<2.2.1|http://secunia.com/advisories/11926 http://www.securityfocus.com/arch
sup<=2.0|http://secunia.com/advisories/11898 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0451|CMU SUP logging format string vulnerabilities|238ea8eb-c5cf-11d8-8898-000d6111a684
rlpr<2.04_1|http://secunia.com/advisories/11906 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0393 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0454 http://www.osvdb.org/7194 http://www.osvdb.org/7195 http://securitytracker.com/id?1010545 http://www.securityfocus.com/archive/1/367045|rlpr "msg()" buffer overflow and format string vulnerabilities|29a72da5-c5ea-11d8-8898-000d6111a684
pure-ftpd<1.0.19|http://www.pureftpd.org/|Pure-FTPd DoS when maximum number of connections is reached|ec5cf461-c691-11d8-8898-000d6111a684
-giFT-FastTrack<0.8.7|http://developer.berlios.de/forum/forum.php?forum_id=5814|giFT-FastTrack remote DoS of HTTP server and client|1f738bda-c6ac-11d8-8898-000d6111a684
diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt
index f4233b127db8..22b1f9342a54 100644
--- a/security/portaudit-db/database/portaudit.txt
+++ b/security/portaudit-db/database/portaudit.txt
@@ -35,4 +35,3 @@ rssh<2.2.1|http://secunia.com/advisories/11926 http://www.securityfocus.com/arch
sup<=2.0|http://secunia.com/advisories/11898 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0451|CMU SUP logging format string vulnerabilities|238ea8eb-c5cf-11d8-8898-000d6111a684
rlpr<2.04_1|http://secunia.com/advisories/11906 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0393 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0454 http://www.osvdb.org/7194 http://www.osvdb.org/7195 http://securitytracker.com/id?1010545 http://www.securityfocus.com/archive/1/367045|rlpr "msg()" buffer overflow and format string vulnerabilities|29a72da5-c5ea-11d8-8898-000d6111a684
pure-ftpd<1.0.19|http://www.pureftpd.org/|Pure-FTPd DoS when maximum number of connections is reached|ec5cf461-c691-11d8-8898-000d6111a684
-giFT-FastTrack<0.8.7|http://developer.berlios.de/forum/forum.php?forum_id=5814|giFT-FastTrack remote DoS of HTTP server and client|1f738bda-c6ac-11d8-8898-000d6111a684
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 4a68eaa4e347..5a08d9c2e57b 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,33 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="1f738bda-c6ac-11d8-8898-000d6111a684">
+ <topic>Remote Denial of Service of HTTP server and client</topic>
+ <affects>
+ <package>
+ <name>giFT-FastTrack</name>
+ <range><lt>0.8.7</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>giFT-FastTrack is susceptible to a remote
+ Denial of Service attack which could allow
+ a remote attacker to render HTTP services
+ unusable. According to the developers, no
+ code execution is possible; however, they
+ recommend an immediate upgrade.</p>
+ </body>
+ </description>
+ <references>
+ <url>http://developer.berlios.de/forum/forum.php?forum_id=5814</url>
+ </references>
+ <dates>
+ <discovery>2004-06-19</discovery>
+ <entry>2004-06-25</entry>
+ </dates>
+ </vuln>
+
<vuln vid="253ea131-bd12-11d8-b071-00e08110b673">
<topic>Gallery 1.4.3 and ealier user authentication bypass</topic>
<affects>