Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <201201241041.30510.luciano@debian.org>
Date: Tue, 24 Jan 2012 10:41:30 +0100
From: Luciano Bello <luciano@...ian.org>
To: oss-security@...ts.openwall.com
Subject: CVE request: bip buffer overflow

Hi there,
        Please, assign a CVE ID for the following vulnerability in bip 
(http://bip.t1r.net): https://projects.duckcorp.org/issues/269

The patch can be found here: 
https://projects.duckcorp.org/projects/bip/repository/revisions/222a33cb84a2e52ad55a88900b7895bf9dd0262c

This bug is present in 0.8.8 and previous versions and, according to reporter, 
remote execution of code should be possible.

Thanks,

/luciano

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.