FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  371710
Date:      2014-10-29
Time:      21:51:17Z
Committer: rakuco

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
e92d8f6b-a1c0-11db-9ddc-0011098b2f36sircd -- remote operator privilege escalation vulnerability

Secunia reports:

A vulnerability has been reported in sircd, which can be exploited by malicious users to gain operator privileges. The problem is that any user reportedly can set their usermode to operator. The vulnerability has been reported in versions 0.5.2 and 0.5.3. Other versions may also be affected.


Discovery 2003-11-20
Entry 2007-01-15
sircd
ge 0

9097
http://secunia.com/advisories/10274/
e92d8f6b-a1c0-11db-9ddc-0011098b2f36sircd -- remote operator privilege escalation vulnerability

Secunia reports:

A vulnerability has been reported in sircd, which can be exploited by malicious users to gain operator privileges. The problem is that any user reportedly can set their usermode to operator. The vulnerability has been reported in versions 0.5.2 and 0.5.3. Other versions may also be affected.


Discovery 2003-11-20
Entry 2007-01-15
sircd
ge 0

9097
http://secunia.com/advisories/10274/
1374b96c-a1c2-11db-9ddc-0011098b2f36sircd -- remote reverse DNS buffer overflow

Secunia reports:

A vulnerability in sircd can be exploited by a malicious person to compromise a vulnerable system. The vulnerability is caused by a boundary error in the code handling reverse DNS lookups, when a user connects to the service. If the FQDN (Fully Qualified Domain Name) returned is excessively long, the allocated buffer is overflowed making it possible to execute arbitrary code on the system with the privileges of the sircd daemon.


Discovery 2003-02-24
Entry 2007-01-15
sircd
le 0.4.0

6924
http://secunia.com/advisories/8153
1374b96c-a1c2-11db-9ddc-0011098b2f36sircd -- remote reverse DNS buffer overflow

Secunia reports:

A vulnerability in sircd can be exploited by a malicious person to compromise a vulnerable system. The vulnerability is caused by a boundary error in the code handling reverse DNS lookups, when a user connects to the service. If the FQDN (Fully Qualified Domain Name) returned is excessively long, the allocated buffer is overflowed making it possible to execute arbitrary code on the system with the privileges of the sircd daemon.


Discovery 2003-02-24
Entry 2007-01-15
sircd
le 0.4.0

6924
http://secunia.com/advisories/8153