summaryrefslogtreecommitdiffstats
path: root/website/DTSA/DTSA-3-1.html
diff options
context:
space:
mode:
authorJoey Hess <joeyh@debian.org>2005-10-19 22:57:32 +0000
committerJoey Hess <joeyh@debian.org>2005-10-19 22:57:32 +0000
commit7f80adf6e6c3a24596af73c5ac1e03fa4c9d2129 (patch)
tree1fcc64ad61167eff165d0351640f02bac28e3cdf /website/DTSA/DTSA-3-1.html
parenta3151f8075f7c8d4570fe04acbbff2810878636e (diff)
update website to use only CVE references
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@2459 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'website/DTSA/DTSA-3-1.html')
-rw-r--r--website/DTSA/DTSA-3-1.html20
1 files changed, 10 insertions, 10 deletions
diff --git a/website/DTSA/DTSA-3-1.html b/website/DTSA/DTSA-3-1.html
index 6051d99f47..166b913702 100644
--- a/website/DTSA/DTSA-3-1.html
+++ b/website/DTSA/DTSA-3-1.html
@@ -50,42 +50,42 @@
<dd>No<br></dd>
<dt>CVE:</dt>
<dd>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2070'>CAN-2005-2070</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1923'>CAN-2005-1923</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2056'>CAN-2005-2056</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1922'>CAN-2005-1922</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2450'>CAN-2005-2450</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2070'>CVE-2005-2070</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1923'>CVE-2005-1923</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2056'>CVE-2005-2056</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1922'>CVE-2005-1922</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2450'>CVE-2005-2450</a>
<br></dd>
<br><dt>More information:</dt>
<dd>Multiple security holes were found in clamav:&nbsp;<br>
&nbsp;<br>
-CAN-2005-2070&nbsp;<br>
+CVE-2005-2070&nbsp;<br>
&nbsp;<br>
The ClamAV Mail fILTER (clamav-milter), when used in Sendmail using long&nbsp;<br>
timeouts, allows remote attackers to cause a denial of service by keeping&nbsp;<br>
an open connection, which prevents ClamAV from reloading.&nbsp;<br>
&nbsp;<br>
-CAN-2005-1923&nbsp;<br>
+CVE-2005-1923&nbsp;<br>
&nbsp;<br>
The ENSURE_BITS macro in mszipd.c for Clam AntiVirus (ClamAV) allows remote&nbsp;<br>
attackers to cause a denial of service (CPU consumption by infinite loop)&nbsp;<br>
via a cabinet (CAB) file with the cffile_FolderOffset field set to 0xff,&nbsp;<br>
which causes a zero-length read.&nbsp;<br>
&nbsp;<br>
-CAN-2005-2056&nbsp;<br>
+CVE-2005-2056&nbsp;<br>
&nbsp;<br>
The Quantum archive decompressor in Clam AntiVirus (ClamAV) allows remote&nbsp;<br>
attackers to cause a denial of service (application crash) via a crafted&nbsp;<br>
Quantum archive.&nbsp;<br>
&nbsp;<br>
-CAN-2005-1922&nbsp;<br>
+CVE-2005-1922&nbsp;<br>
&nbsp;<br>
The MS-Expand file handling in Clam AntiVirus (ClamAV) allows remote&nbsp;<br>
attackers to cause a denial of service (file descriptor and memory&nbsp;<br>
consumption) via a crafted file that causes repeated errors in the&nbsp;<br>
cli_msexpand function.&nbsp;<br>
&nbsp;<br>
-CAN-2005-2450&nbsp;<br>
+CVE-2005-2450&nbsp;<br>
&nbsp;<br>
Multiple integer overflows in the (1) TNEF, (2) CHM, or (3) FSG file&nbsp;<br>
format processors in libclamav for Clam AntiVirus (ClamAV) allow remote&nbsp;<br>

© 2014-2024 Faster IT GmbH | imprint | privacy policy