svn commit: r351210 - head/security/vuxml
Rene Ladan
rene at FreeBSD.org
Sun Apr 13 12:17:20 UTC 2014
Author: rene
Date: Sun Apr 13 12:17:19 2014
New Revision: 351210
URL: http://svnweb.freebsd.org/changeset/ports/351210
QAT: https://qat.redports.org/buildarchive/r351210/
Log:
Mention a vulnerability in japanese/chasen* which exists since 2011-11-08
Obtained from: http://jvn.jp/en/jp/JVN16901583/index.html
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Sun Apr 13 12:14:39 2014 (r351209)
+++ head/security/vuxml/vuln.xml Sun Apr 13 12:17:19 2014 (r351210)
@@ -51,6 +51,42 @@ Note: Please add new entries to the beg
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="972837fc-c304-11e3-8758-00262d5ed8ee">
+ <topic>ChaSen -- bufer overflow</topic>
+ <affects>
+ <package>
+ <name>chasen-base</name>
+ <range><lt>2.4.5</lt></range>
+ </package>
+ <package>
+ <name>chasen</name>
+ <range><lt>2.4.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>JVN iPedia reports:</p>
+ <blockquote cite="http://jvn.jp/en/jp/JVN16901583/index.html">
+ <p>ChaSen provided by Nara Institute of Science and Technology is a
+ software for morphologically analyzing Japanese. ChaSen contains an
+ issue when reading in strings, which may lead to a buffer
+ overflow.</p>
+ <p>An arbitrary script may be executed by an attacker with access to
+ a system that is running a product listed in "Products
+ Affected."</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2011-4000</cvename>
+ <url>http://jvn.jp/en/jp/JVN16901583/index.html</url>
+ </references>
+ <dates>
+ <discovery>2011-11-08</discovery>
+ <entry>2014-04-13</entry>
+ </dates>
+ </vuln>
+
<vuln vid="7ccd4def-c1be-11e3-9d09-000c2980a9f3">
<topic>OpenSSL -- Local Information Disclosure</topic>
<affects>
More information about the svn-ports-all
mailing list