Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=dcf9d514fe0c37c8f971a3fa5444dbab64d0d489
commit dcf9d514fe0c37c8f971a3fa5444dbab64d0d489 Author: voroskoi <[EMAIL PROTECTED]> Date: Mon Jan 21 20:39:08 2008 +0100 FSA351-cups diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index 405c743..a70c4e0 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -27,6 +27,19 @@ <fsas> <fsa> + <id>351</id> + <date>2008-01-21</date> + <author>voroskoi</author> + <package>cups</package> + <vulnerable>1.3.2-2sayshell2</vulnerable> + <unaffected>1.3.2-2sayshell3</unaffected> + <bts>http://bugs.frugalware.org/task/2676</bts> + <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5849</cve> + <desc>A vulnerability has been reported in CUPS, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. + The vulnerability is caused due to a signedness error within the "asn1_get_string()" function in backend/snmp.c. This can be exploited to cause a stack-based buffer overflow via specially crafted SNMP responses containing ASN1 encoded strings with negative length values. + Successful exploitation on 1.3.x versions requires that the snmp backend is configured in snmp.conf.</desc> + </fsa> + <fsa> <id>350</id> <date>2008-01-21</date> <author>voroskoi</author> _______________________________________________ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git