Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 6 Mar 2014 13:09:20 +0000 (UTC)
From:      Baptiste Daroussin <bapt@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r347193 - head/security/vuxml
Message-ID:  <201403061309.s26D9Keg097213@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: bapt
Date: Thu Mar  6 13:09:20 2014
New Revision: 347193
URL: http://svnweb.freebsd.org/changeset/ports/347193
QAT: https://qat.redports.org/buildarchive/r347193/

Log:
  Reference xmms vulnerabilities: CVE-2007-0653 and CVE-2007-0654

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu Mar  6 13:04:17 2014	(r347192)
+++ head/security/vuxml/vuln.xml	Thu Mar  6 13:09:20 2014	(r347193)
@@ -51,6 +51,46 @@ Note:  Please add new entries to the beg
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="20e23b65-a52e-11e3-ae3a-00224d7c32a2">
+    <topic>xmms -- Integer Overflow And Underflow Vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>xmms</name>
+	<range><le>1.2.11_20</le></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Secunia reports:</p>
+	<blockquote cite="http://secunia.com/secunia_research/2007-47/advisory/">;
+	  <p>Secunia Research has discovered two vulnerabilities in XMMS, which can
+	    be exploited by malicious people to compromise a user's system.</p>
+
+	  <p>1) An integer underflow error exists in the processing of skin bitmap
+	    images. This can be exploited to cause a stack-based buffer overflow
+	    via specially crafted skin images containing manipulated header
+	    information.</p>
+
+	  <p>Successful exploitation allows execution of arbitrary code.</p>
+
+	  <p>2) An integer overflow error exists in the processing of skin bitmap
+	    images. This can be exploited to cause memory corruption via specially
+	    crafted skin images containing manipulated header information.</p>
+
+	  <p>Successful exploitation may allow the execution of arbitrary code.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2007-0653</cvename>
+      <cvename>CVE-2007-0654</cvename>
+    </references>
+    <dates>
+      <discovery>2007-02-06</discovery>
+      <entry>2014-03-06</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="89db3b31-a4c3-11e3-978f-f0def16c5c1b">
     <topic>nginx -- SPDY memory corruption</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201403061309.s26D9Keg097213>