summaryrefslogtreecommitdiffstats
path: root/data/DTSA/advs
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2005-09-10 00:45:14 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2005-09-10 00:45:14 +0000
commit2c846919aeef5b7b718ab3f6e7100609cb7a2a97 (patch)
tree4d39fe403b024ed105caadc64f2bd1c43f940b97 /data/DTSA/advs
parent267f5c03f8f5db7ad2ee9c8913ca033582d318e1 (diff)
more bugnums
remove the old hotzenplotz example .adv git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@1897 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'data/DTSA/advs')
-rw-r--r--data/DTSA/advs/0-hotzenplotz.adv15
1 files changed, 0 insertions, 15 deletions
diff --git a/data/DTSA/advs/0-hotzenplotz.adv b/data/DTSA/advs/0-hotzenplotz.adv
deleted file mode 100644
index 9c00c736e7..0000000000
--- a/data/DTSA/advs/0-hotzenplotz.adv
+++ /dev/null
@@ -1,15 +0,0 @@
-source: hotzenplotz
-date: September 7th, 2005
-author: Wachtmeister Dimpfelmoser
-vuln-type: buffer overflows
-problem-scope: remote
-debian-specifc:
-cve: CAN-1978-0019
-vendor-advisory: http://www.hotzenplotz.org/sec/buffer-overflow.html
-testing-fix: 3.14-1ts1
-sid-fix: 3.14-2
-upgrade: apt-get install hotzenplotz
-
-User authentication in hotzenplotz does not verify the user name properly.
-A buffer overflow can be exploited to execute arbitrary code with elevated
-privileges.

© 2014-2024 Faster IT GmbH | imprint | privacy policy