|
Message-Id: <20150212204735.7B67372EB85@smtpvbsrv1.mitre.org> Date: Thu, 12 Feb 2015 15:47:35 -0500 (EST) From: cve-assign@...re.org To: jmm@...ian.org Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE request: archmage directory traversal -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > please assign a CVE ID for this directory traversal in archmage: > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776164 > > archmage is vulnerable to directory traversal via "../" sequences. As a > proof of concept, unpacking the attached CHM file creates a file in > /tmp Use CVE-2015-1589. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJU3REQAAoJEKllVAevmvms3b4IALKbsUUNpNbS+B/wKOTln6Wn 777lAP5WnFym0Tv86hp8zOE8AAEhmhWUmkMfIakZ6fC+V8WF2oAiHc3tQks7JKt6 AwyfmcyGJlBNc/ZOpRpeGZ9MfL/igNXf/pEYrt8BF1TroznfW30ZLP4J5CvYod7Z dhmM0y6LhSAIJkYPlowCC4n7m3DIbmlexuoOhVdG0k89R6TzEXaMEKZvdvchyta2 3S1EMviuGKGTx64ZcIgjLXRys++qtFmfiu4sv+ywOJ1zWLgv0K+pU/f39lOEryyY pObrvjbyEnwX8/vDIgjPp062VIeVIgEynfugmu28c9UME/gBMVn8+Y1xJtpRQos= =wCNl -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.