FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-11-27 06:34:59 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
616cf823-f48b-11d8-9837-000c41e2cdadcourier-imap -- format string vulnerability in debug mode

An iDEFENSE security advisory describes a format string vulnerability that could be exploited when Courier-IMAP is run in debug mode (DEBUG_LOGIN set).


Discovery 2004-08-18
Entry 2004-08-22
Modified 2013-06-19
courier-imap
< 3.0.7,1

CVE-2004-0777
http://lists.netsys.com/pipermail/full-disclosure/2004-August/025478.html
http://www.idefense.com/application/poi/display?id=131&type=vulnerabilities&flashstatus=false
10976
98bd69c3-834b-11d8-a41f-0020ed76ef5aCourier mail services: remotely exploitable buffer overflows

The Courier set of mail services use a common Unicode library. This library contains buffer overflows in the converters for two popular Japanese character encodings. These overflows may be remotely exploitable, triggered by a maliciously formatted email message that is later processed by one of the Courier mail services. From the release notes for the corrected versions of the Courier set of mail services:

iso2022jp.c: Converters became (upper-)compatible with ISO-2022-JP (RFC1468 / JIS X 0208:1997 Annex 2) and ISO-2022-JP-1 (RFC2237). Buffer overflow vulnerability (when Unicode character is out of BMP range) has been closed. Convert error handling was implemented.

shiftjis.c: Broken SHIFT_JIS converters has been fixed and became (upper-)compatible with Shifted Encoding Method (JIS X 0208:1997 Annex 1). Buffer overflow vulnerability (when Unicode character is out of BMP range) has been closed. Convert error handling was implemented.


Discovery 2004-02-01
Entry 2004-03-31
Modified 2004-07-16
courier
< 0.45

courier-imap
< 3.0,1

sqwebmail
< 4.0

CVE-2004-0224
http://cvs.sourceforge.net/viewcvs.py/courier/libs/unicode/iso2022jp.c?rev=1.10&view=markup
http://cvs.sourceforge.net/viewcvs.py/courier/libs/unicode/shiftjis.c?rev=1.6&view=markup
9845
http://secunia.com/advisories/11087
http://www.osvdb.org/4194
http://www.osvdb.org/6927