Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 24 Jan 2012 10:41:30 +0100
From: Luciano Bello <luciano@...ian.org>
To: oss-security@...ts.openwall.com
Subject: CVE request: bip buffer overflow

Hi there,
        Please, assign a CVE ID for the following vulnerability in bip 
(http://bip.t1r.net): https://projects.duckcorp.org/issues/269

The patch can be found here: 
https://projects.duckcorp.org/projects/bip/repository/revisions/222a33cb84a2e52ad55a88900b7895bf9dd0262c

This bug is present in 0.8.8 and previous versions and, according to reporter, 
remote execution of code should be possible.

Thanks,

/luciano

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ