summaryrefslogtreecommitdiffstats
path: root/data/DTSA/advs/20-mailutils.adv
diff options
context:
space:
mode:
authorJoey Hess <joeyh@debian.org>2005-10-19 23:10:21 +0000
committerJoey Hess <joeyh@debian.org>2005-10-19 23:10:21 +0000
commit20cd29d934ef16cee0a9d683f5ac4233739c1a12 (patch)
tree0a755eecca326176394c24227671bdb9c379403c /data/DTSA/advs/20-mailutils.adv
parent42d226f0d20fb9aaf7c03c81e97c4a5d25e35e70 (diff)
update references to CANs to be CVEs and complete CVE transition
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@2462 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'data/DTSA/advs/20-mailutils.adv')
-rw-r--r--data/DTSA/advs/20-mailutils.adv4
1 files changed, 2 insertions, 2 deletions
diff --git a/data/DTSA/advs/20-mailutils.adv b/data/DTSA/advs/20-mailutils.adv
index 376f3d3b2e..02129dadb9 100644
--- a/data/DTSA/advs/20-mailutils.adv
+++ b/data/DTSA/advs/20-mailutils.adv
@@ -4,7 +4,7 @@ author: Neil McGovern
vuln-type: Format string vulnerability
problem-scope: remote
debian-specifc: no
-cve: CAN-2005-2878
+cve: CVE-2005-2878
vendor-advisory: http://savannah.gnu.org/patch/index.php?func=detailitem&item_id=4407
testing-fix: 1:0.6.90-2.1etch1
sid-fix: 1:0.6.90-3
@@ -12,7 +12,7 @@ upgrade: apt-get upgrade
A format string vulnerability has been discovered in Mailutils.
-CAN-2005-2878
+CVE-2005-2878
A format string vulnerability in search.c in the imap4d server in GNU
Mailutils 0.6 allows remote authenticated users to execute arbitrary code via
format string specifiers in the SEARCH command.

© 2014-2024 Faster IT GmbH | imprint | privacy policy