svn commit: r347197 - branches/2014Q1/security/vuxml
Baptiste Daroussin
bapt at FreeBSD.org
Thu Mar 6 13:25:29 UTC 2014
Author: bapt
Date: Thu Mar 6 13:25:28 2014
New Revision: 347197
URL: http://svnweb.freebsd.org/changeset/ports/347197
QAT: https://qat.redports.org/buildarchive/r347197/
Log:
MFH: r347193
Reference xmms vulnerabilities: CVE-2007-0653 and CVE-2007-0654
Modified:
branches/2014Q1/security/vuxml/vuln.xml
Directory Properties:
branches/2014Q1/ (props changed)
Modified: branches/2014Q1/security/vuxml/vuln.xml
==============================================================================
--- branches/2014Q1/security/vuxml/vuln.xml Thu Mar 6 13:17:49 2014 (r347196)
+++ branches/2014Q1/security/vuxml/vuln.xml Thu Mar 6 13:25:28 2014 (r347197)
@@ -51,6 +51,46 @@ Note: Please add new entries to the beg
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="20e23b65-a52e-11e3-ae3a-00224d7c32a2">
+ <topic>xmms -- Integer Overflow And Underflow Vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>xmms</name>
+ <range><le>1.2.11_20</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Secunia reports:</p>
+ <blockquote cite="http://secunia.com/secunia_research/2007-47/advisory/">
+ <p>Secunia Research has discovered two vulnerabilities in XMMS, which can
+ be exploited by malicious people to compromise a user's system.</p>
+
+ <p>1) An integer underflow error exists in the processing of skin bitmap
+ images. This can be exploited to cause a stack-based buffer overflow
+ via specially crafted skin images containing manipulated header
+ information.</p>
+
+ <p>Successful exploitation allows execution of arbitrary code.</p>
+
+ <p>2) An integer overflow error exists in the processing of skin bitmap
+ images. This can be exploited to cause memory corruption via specially
+ crafted skin images containing manipulated header information.</p>
+
+ <p>Successful exploitation may allow the execution of arbitrary code.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2007-0653</cvename>
+ <cvename>CVE-2007-0654</cvename>
+ </references>
+ <dates>
+ <discovery>2007-02-06</discovery>
+ <entry>2014-03-06</entry>
+ </dates>
+ </vuln>
+
<vuln vid="89db3b31-a4c3-11e3-978f-f0def16c5c1b">
<topic>nginx -- SPDY memory corruption</topic>
<affects>
More information about the svn-ports-all
mailing list