ports/130013: vuxml update: vuln.xml entry for ports/foo

Mark Foster mark at foster.cc
Mon Dec 29 07:30:03 UTC 2008

>Number:         130013
>Category:       ports
>Synopsis:       vuxml update: vuln.xml entry for ports/foo
>Confidential:   no
>Severity:       serious
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Class:          update
>Submitter-Id:   current-users
>Arrival-Date:   Mon Dec 29 07:30:02 UTC 2008
>Originator:     Mark Foster
>Release:        FreeBSD 7.0-RELEASE-p5 i386
System: FreeBSD frau.foster.cc 7.0-RELEASE-p5 FreeBSD 7.0-RELEASE-p5 #0: Sat Nov 1 15:07:32 PDT 2008 root at frau.foster.cc:/usr/obj/usr/src/sys/VMWARE2 i386


<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
   <vuln vid="4bef2efc-7850-4a7c-96e4-4662417534bd">
     <topic>imap-uw -- University Of Washington IMAP c-client Buffer Overflow</topic>
       <body xmlns="http://www.w3.org/1999/xhtml">
         <p>SANS reports:</p>
         <blockquote cite="http://www.washington.edu/imap/documentation/RELNOTES.html">
           <p>The University of Washington IMAP library is a library
implementing the IMAP mail protocol. University of Washington IMAP is
exposed to a buffer overflow issue that occurs due to a boundary error
within the rfc822_output_char function in the c-client library.
The University of Washington IMAP library versions prior to 2007e are


More information about the freebsd-ports-bugs mailing list