- Document elinks < 0.11.4 buffer overflow vulnerability.
This commit is contained in:
parent
eefbd045b9
commit
3f4313519c
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=243294
1 changed files with 33 additions and 0 deletions
|
@ -35,6 +35,39 @@ Note: Please add new entries to the beginning of this file.
|
|||
-->
|
||||
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="2544f543-c178-11de-b175-001cc0377035">
|
||||
<topic>elinks -- buffer overflow vulnerability</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>elinks</name>
|
||||
<range><lt>0.11.4</lt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>SecurityFocus reports:</p>
|
||||
<blockquote cite="http://www.securityfocus.com/bid/36574/discuss">
|
||||
<p>ELinks is prone to an off-by-one buffer-overflow vulnerability
|
||||
because the application fails to accurately reference the last
|
||||
element of a buffer.</p>
|
||||
<p>Attackers may leverage this issue to execute arbitrary code in
|
||||
the context of the application. Failed attacks will cause
|
||||
denial-of-service conditions.</p>
|
||||
</blockquote>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<bid>36574</bid>
|
||||
<cvename>CVE-2008-7224</cvename>
|
||||
<mlist msgid="20080204235429.GA28006@diku.dk">http://linuxfromscratch.org/pipermail/elinks-users/2008-February/001604.html</mlist>
|
||||
<url>http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=380347</url>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>29-07-2006</discovery>
|
||||
<entry>2009-10-25</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="692ab645-bf5d-11de-849b-00151797c2d4">
|
||||
<topic>squidGuard -- multiple vulnerabilities</topic>
|
||||
<affects>
|
||||
|
|
Loading…
Reference in a new issue