1
0
mirror of https://git.FreeBSD.org/ports.git synced 2025-02-01 10:59:55 +00:00

- Add CVE information for nsd overflow.

- s/over flow/overflow/ for the same entry.

Submitted by:	Eygene Ryabinkin <rea-fbsd@codelabs.ru> (private mail)
This commit is contained in:
Wesley Shields 2009-05-22 13:15:21 +00:00
parent a5e2879657
commit 5e68f8ae80
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=234390

View File

@ -79,7 +79,7 @@ Note: Please add new entries to the beginning of this file.
<body xmlns="http://www.w3.org/1999/xhtml"> <body xmlns="http://www.w3.org/1999/xhtml">
<p>NLnet Labs:</p> <p>NLnet Labs:</p>
<blockquote cite="http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html"> <blockquote cite="http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html">
<p>A one-byte buffer over flow has been reported in NSD. The <p>A one-byte buffer overflow has been reported in NSD. The
problem affects all versions 2.0.0 to 3.2.1. The bug allows problem affects all versions 2.0.0 to 3.2.1. The bug allows
a carefully crafted exploit to bring down your DNS server. It a carefully crafted exploit to bring down your DNS server. It
is highly unlikely that this one byte overflow can lead to is highly unlikely that this one byte overflow can lead to
@ -88,6 +88,7 @@ Note: Please add new entries to the beginning of this file.
</body> </body>
</description> </description>
<references> <references>
<cvename>CVE-2009-1755</cvename>
<url>http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html</url> <url>http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html</url>
</references> </references>
<dates> <dates>