View | Details | Raw Unified | Return to bug 212380
Collapse All | Expand All

(-)security/vuxml/vuln.xml (working copy) (+34 lines)
Lines 58-63 Link Here
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="cb3f036d-8c7f-11e6-924a-60a44ce6887b">
62
    <topic>libvncserver -- multiple security vulnerabilities</topic>
63
    <affects>
64
      <package>
65
       <name>libvncserver</name>
66
       <range><lt>0.9.10</lt></range>
67
      </package>
68
    </affects>
69
    <description>
70
      <body xmlns="http://www.w3.org/1999/xhtml">
71
       <p>Nicolas Ruff reports:</p>
72
       <blockquote cite="http://seclists.org/oss-sec/2014/q3/639">
73
         <p>Integer overflow in MallocFrameBuffer() on client side.</p>
74
         <p>Lack of malloc() return value checking on client side.</p>
75
         <p>Server crash on a very large ClientCutText message.</p>
76
         <p>Server crash when scaling factor is set to zero.</p>
77
         <p>Multiple stack overflows in File Transfer feature.</p>
78
       </blockquote>
79
      </body>
80
    </description>
81
    <references>
82
      <url>http://seclists.org/oss-sec/2014/q3/639</url>
83
      <cvename>CVE-2014-6051</cvename>
84
      <cvename>CVE-2014-6052</cvename>
85
      <cvename>CVE-2014-6053</cvename>
86
      <cvename>CVE-2014-6054</cvename>
87
      <cvename>CVE-2014-6055</cvename>
88
    </references>
89
    <dates>
90
      <discovery>2014-09-23</discovery>
91
      <entry>2016-10-07</entry>
92
    </dates>
93
  </vuln>
94
61
  <vuln vid="c8d902b1-8550-11e6-81e7-d050996490d0">
95
  <vuln vid="c8d902b1-8550-11e6-81e7-d050996490d0">
62
    <topic>BIND -- Remote Denial of Service vulnerability</topic>
96
    <topic>BIND -- Remote Denial of Service vulnerability</topic>
63
    <affects>
97
    <affects>

Return to bug 212380