From 88f4ad87a7dc8d135ef52c1a2bba8785eda80fa6 Mon Sep 17 00:00:00 2001 From: Stefan Walter Date: Sun, 8 Apr 2007 19:45:57 +0000 Subject: Add entry for exploitable buffer overflow in mcweject. PR: 111365 Submitted by: Jeff Forsythe --- security/vuxml/vuln.xml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) (limited to 'security') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 047a5329f6f0..be7bd39012da 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,36 @@ Note: Please add new entries to the beginning of this file. --> + + mcweject -- exploitable buffer overflow + + + mcweject + 0.9 + + + + +

CVE reports:

+
+

Buffer overflow in eject.c in Jason W. Bacon mcweject 0.9 on + FreeBSD, and possibly other versions, allows local users to execute + arbitrary code via a long command line argument, possibly involving + the device name.

+
+ +
+ + ports/111365 + http://www.milw0rm.com/exploits/3578 + CVE-2007-1719 + + + 2007-03-27 + 2007-04-08 + +
+ webcalendar -- "noSet" variable overwrite vulnerability -- cgit v1.2.3