Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=dcf9d514fe0c37c8f971a3fa5444dbab64d0d489

commit dcf9d514fe0c37c8f971a3fa5444dbab64d0d489
Author: voroskoi <[EMAIL PROTECTED]>
Date:   Mon Jan 21 20:39:08 2008 +0100

FSA351-cups

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 405c743..a70c4e0 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -27,6 +27,19 @@

<fsas>
<fsa>
+               <id>351</id>
+               <date>2008-01-21</date>
+               <author>voroskoi</author>
+               <package>cups</package>
+               <vulnerable>1.3.2-2sayshell2</vulnerable>
+               <unaffected>1.3.2-2sayshell3</unaffected>
+               <bts>http://bugs.frugalware.org/task/2676</bts>
+               
<cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5849</cve>
+               <desc>A vulnerability has been reported in CUPS, which can be 
exploited by malicious people to cause a DoS (Denial of Service) or potentially 
compromise a vulnerable system.
+                       The vulnerability is caused due to a signedness error 
within the "asn1_get_string()" function in backend/snmp.c. This can be 
exploited to cause a stack-based buffer overflow via specially crafted SNMP 
responses containing ASN1 encoded strings with negative length values.
+                       Successful exploitation on 1.3.x versions requires that 
the snmp backend is configured in snmp.conf.</desc>
+       </fsa>
+       <fsa>
<id>350</id>
<date>2008-01-21</date>
<author>voroskoi</author>
_______________________________________________
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to