1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-10-19 19:59:43 +00:00

Remove entry 2de14f7a-dad9-11d8-b59a-00061bc2ad93 (Multiple

Potential Buffer Overruns in Samba) which is duplicated from
vuln.xml.  I don't know why this entry is duplicated here, but I
suspect it's related to portaudit.txt.

By removing the entry from here, the entry in vuln.xml should
just be used instead.

PR:		ports/129240
Reported by:	Eygene Ryabinkin <rea-fbsd@codelabs.ru>
This commit is contained in:
Simon L. B. Nielsen 2008-11-30 21:54:20 +00:00
parent c82fdf4ec3
commit ad0cd568d7
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=223645
2 changed files with 0 additions and 46 deletions

View File

@ -6,7 +6,6 @@
78348ea2-ec91-11d8-b913-000c41e2cdad
641859e8-eca1-11d8-b913-000c41e2cdad
603fe36d-ec9d-11d8-b913-000c41e2cdad
2de14f7a-dad9-11d8-b59a-00061bc2ad93
7a9d5dfe-c507-11d8-8898-000d6111a684
3a408f6f-9c52-11d8-9366-0020ed76ef5a
e5e2883d-ceb9-11d8-8898-000d6111a684

View File

@ -282,51 +282,6 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
</dates>
</vuln>
<vuln vid="2de14f7a-dad9-11d8-b59a-00061bc2ad93">
<topic>Multiple Potential Buffer Overruns in Samba</topic>
<affects>
<package>
<name>samba</name>
<range><ge>3.*</ge><lt>3.0.5,1</lt></range>
<range><lt>2.2.10</lt></range>
</package>
<package>
<name>ja-samba</name>
<range><lt>2.2.10.*</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Evgeny Demidov discovered that the Samba server has a
buffer overflow in the Samba Web Administration Tool (SWAT)
on decoding Base64 data during HTTP Basic Authentication.
Versions 3.0.2 through 3.0.4 are affected.</p>
<p>Another buffer overflow bug has been found in the code
used to support the "mangling method = hash" smb.conf
option. The default setting for this parameter is "mangling
method = hash2" and therefore not vulnerable. Versions
between 2.2.0 through 2.2.9 and 3.0.0 through 3.0.4 are affected.
</p>
</body>
</description>
<references>
<cvename>CAN-2004-0600</cvename>
<cvename>CAN-2004-0686</cvename>
<mlist msgid="web-53121174@cgp.agava.net">http://www.securityfocus.com/archive/1/369698</mlist>
<mlist msgid="200407222031.25086.bugtraq@beyondsecurity.com">http://www.securityfocus.com/archive/1/369706</mlist>
<url>http://www.samba.org/samba/whatsnew/samba-3.0.5.html</url>
<url>http://www.samba.org/samba/whatsnew/samba-2.2.10.html</url>
<url>http://www.osvdb.org/8190</url>
<url>http://www.osvdb.org/8191</url>
<url>http://secunia.com/advisories/12130</url>
</references>
<dates>
<discovery>2004-07-14</discovery>
<entry>2004-07-21</entry>
<modified>2004-07-22</modified>
</dates>
</vuln>
<vuln vid="7a9d5dfe-c507-11d8-8898-000d6111a684">
<topic>isc-dhcp3-server buffer overflow in logging mechanism</topic>
<affects>