FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  366223
Date:      2014-08-26
Time:      16:36:41Z
Committer: rene

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
3a408f6f-9c52-11d8-9366-0020ed76ef5alibpng denial-of-service

Steve Grubb reports a buffer read overrun in libpng's png_format_buffer function. A specially constructed PNG image processed by an application using libpng may trigger the buffer read overrun and possibly result in an application crash.


Discovery 2004-04-29
Entry 2004-05-02
Modified 2004-08-12
linux-png
le 1.0.14_3

ge 1.2 le 1.2.2

png
lt 1.2.5_4

CVE-2004-0421
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120508
http://rhn.redhat.com/errata/RHSA-2004-181.html
http://secunia.com/advisories/11505
http://www.osvdb.org/5726
10244
3a408f6f-9c52-11d8-9366-0020ed76ef5alibpng denial-of-service

Steve Grubb reports a buffer read overrun in libpng's png_format_buffer function. A specially constructed PNG image processed by an application using libpng may trigger the buffer read overrun and possibly result in an application crash.


Discovery 2004-04-29
Entry 2004-05-02
Modified 2004-08-12
linux-png
le 1.0.14_3

ge 1.2 le 1.2.2

png
lt 1.2.5_4

CVE-2004-0421
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120508
http://rhn.redhat.com/errata/RHSA-2004-181.html
http://secunia.com/advisories/11505
http://www.osvdb.org/5726
10244
f9e3e60b-e650-11d8-9b0a-000347a4fa7dlibpng stack-based buffer overflow and other code concerns

Chris Evans has discovered multiple vulnerabilities in libpng, which can be exploited by malicious people to compromise a vulnerable system or cause a DoS (Denial of Service).


Discovery 2004-08-04
Entry 2004-08-04
Modified 2004-08-15
png
le 1.2.5_7

linux-png
le 1.0.14_3

ge 1.2 le 1.2.2

firefox
lt 0.9.3

thunderbird
lt 0.7.3

linux-mozilla
lt 1.7.2

linux-mozilla-devel
lt 1.7.2

mozilla
lt 1.7.2,2

ge 1.8.a,2 le 1.8.a2,2

mozilla-gtk1
lt 1.7.2

netscape-communicator
netscape-navigator
le 4.78

linux-netscape-communicator
linux-netscape-navigator
ko-netscape-navigator-linux
ko-netscape-communicator-linux
ja-netscape-communicator-linux
ja-netscape-navigator-linux
le 4.8

netscape7
ja-netscape7
le 7.1

pt_BR-netscape7
fr-netscape7
de-netscape7
le 7.02

http://www.securityfocus.com/archive/1/370853
http://scary.beasts.org/security/CESA-2004-001.txt
http://www.osvdb.org/8312
http://www.osvdb.org/8313
http://www.osvdb.org/8314
http://www.osvdb.org/8315
http://www.osvdb.org/8316
CVE-2004-0597
CVE-2004-0598
CVE-2004-0599
388984
236656
160448
477512
817368
286464
http://secunia.com/advisories/12219
http://secunia.com/advisories/12232
http://bugzilla.mozilla.org/show_bug.cgi?id=251381
TA04-217A
http://dl.sourceforge.net/sourceforge/libpng/ADVISORY.txt
f9e3e60b-e650-11d8-9b0a-000347a4fa7dlibpng stack-based buffer overflow and other code concerns

Chris Evans has discovered multiple vulnerabilities in libpng, which can be exploited by malicious people to compromise a vulnerable system or cause a DoS (Denial of Service).


Discovery 2004-08-04
Entry 2004-08-04
Modified 2004-08-15
png
le 1.2.5_7

linux-png
le 1.0.14_3

ge 1.2 le 1.2.2

firefox
lt 0.9.3

thunderbird
lt 0.7.3

linux-mozilla
lt 1.7.2

linux-mozilla-devel
lt 1.7.2

mozilla
lt 1.7.2,2

ge 1.8.a,2 le 1.8.a2,2

mozilla-gtk1
lt 1.7.2

netscape-communicator
netscape-navigator
le 4.78

linux-netscape-communicator
linux-netscape-navigator
ko-netscape-navigator-linux
ko-netscape-communicator-linux
ja-netscape-communicator-linux
ja-netscape-navigator-linux
le 4.8

netscape7
ja-netscape7
le 7.1

pt_BR-netscape7
fr-netscape7
de-netscape7
le 7.02

http://www.securityfocus.com/archive/1/370853
http://scary.beasts.org/security/CESA-2004-001.txt
http://www.osvdb.org/8312
http://www.osvdb.org/8313
http://www.osvdb.org/8314
http://www.osvdb.org/8315
http://www.osvdb.org/8316
CVE-2004-0597
CVE-2004-0598
CVE-2004-0599
388984
236656
160448
477512
817368
286464
http://secunia.com/advisories/12219
http://secunia.com/advisories/12232
http://bugzilla.mozilla.org/show_bug.cgi?id=251381
TA04-217A
http://dl.sourceforge.net/sourceforge/libpng/ADVISORY.txt