diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2005-09-10 00:45:14 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2005-09-10 00:45:14 +0000 |
commit | 2c846919aeef5b7b718ab3f6e7100609cb7a2a97 (patch) | |
tree | 4d39fe403b024ed105caadc64f2bd1c43f940b97 /data/DTSA/advs | |
parent | 267f5c03f8f5db7ad2ee9c8913ca033582d318e1 (diff) |
more bugnums
remove the old hotzenplotz example .adv
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@1897 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'data/DTSA/advs')
-rw-r--r-- | data/DTSA/advs/0-hotzenplotz.adv | 15 |
1 files changed, 0 insertions, 15 deletions
diff --git a/data/DTSA/advs/0-hotzenplotz.adv b/data/DTSA/advs/0-hotzenplotz.adv deleted file mode 100644 index 9c00c736e7..0000000000 --- a/data/DTSA/advs/0-hotzenplotz.adv +++ /dev/null @@ -1,15 +0,0 @@ -source: hotzenplotz -date: September 7th, 2005 -author: Wachtmeister Dimpfelmoser -vuln-type: buffer overflows -problem-scope: remote -debian-specifc: -cve: CAN-1978-0019 -vendor-advisory: http://www.hotzenplotz.org/sec/buffer-overflow.html -testing-fix: 3.14-1ts1 -sid-fix: 3.14-2 -upgrade: apt-get install hotzenplotz - -User authentication in hotzenplotz does not verify the user name properly. -A buffer overflow can be exploited to execute arbitrary code with elevated -privileges. |