mirror of
https://git.FreeBSD.org/ports.git
synced 2024-10-19 19:59:43 +00:00
Remove entry 2de14f7a-dad9-11d8-b59a-00061bc2ad93 (Multiple
Potential Buffer Overruns in Samba) which is duplicated from vuln.xml. I don't know why this entry is duplicated here, but I suspect it's related to portaudit.txt. By removing the entry from here, the entry in vuln.xml should just be used instead. PR: ports/129240 Reported by: Eygene Ryabinkin <rea-fbsd@codelabs.ru>
This commit is contained in:
parent
c82fdf4ec3
commit
ad0cd568d7
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=223645
@ -6,7 +6,6 @@
|
||||
78348ea2-ec91-11d8-b913-000c41e2cdad
|
||||
641859e8-eca1-11d8-b913-000c41e2cdad
|
||||
603fe36d-ec9d-11d8-b913-000c41e2cdad
|
||||
2de14f7a-dad9-11d8-b59a-00061bc2ad93
|
||||
7a9d5dfe-c507-11d8-8898-000d6111a684
|
||||
3a408f6f-9c52-11d8-9366-0020ed76ef5a
|
||||
e5e2883d-ceb9-11d8-8898-000d6111a684
|
||||
|
@ -282,51 +282,6 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="2de14f7a-dad9-11d8-b59a-00061bc2ad93">
|
||||
<topic>Multiple Potential Buffer Overruns in Samba</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>samba</name>
|
||||
<range><ge>3.*</ge><lt>3.0.5,1</lt></range>
|
||||
<range><lt>2.2.10</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>ja-samba</name>
|
||||
<range><lt>2.2.10.*</lt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>Evgeny Demidov discovered that the Samba server has a
|
||||
buffer overflow in the Samba Web Administration Tool (SWAT)
|
||||
on decoding Base64 data during HTTP Basic Authentication.
|
||||
Versions 3.0.2 through 3.0.4 are affected.</p>
|
||||
<p>Another buffer overflow bug has been found in the code
|
||||
used to support the "mangling method = hash" smb.conf
|
||||
option. The default setting for this parameter is "mangling
|
||||
method = hash2" and therefore not vulnerable. Versions
|
||||
between 2.2.0 through 2.2.9 and 3.0.0 through 3.0.4 are affected.
|
||||
</p>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<cvename>CAN-2004-0600</cvename>
|
||||
<cvename>CAN-2004-0686</cvename>
|
||||
<mlist msgid="web-53121174@cgp.agava.net">http://www.securityfocus.com/archive/1/369698</mlist>
|
||||
<mlist msgid="200407222031.25086.bugtraq@beyondsecurity.com">http://www.securityfocus.com/archive/1/369706</mlist>
|
||||
<url>http://www.samba.org/samba/whatsnew/samba-3.0.5.html</url>
|
||||
<url>http://www.samba.org/samba/whatsnew/samba-2.2.10.html</url>
|
||||
<url>http://www.osvdb.org/8190</url>
|
||||
<url>http://www.osvdb.org/8191</url>
|
||||
<url>http://secunia.com/advisories/12130</url>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2004-07-14</discovery>
|
||||
<entry>2004-07-21</entry>
|
||||
<modified>2004-07-22</modified>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="7a9d5dfe-c507-11d8-8898-000d6111a684">
|
||||
<topic>isc-dhcp3-server buffer overflow in logging mechanism</topic>
|
||||
<affects>
|
||||
|
Loading…
Reference in New Issue
Block a user