Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <2A58D60A-BDD0-4546-BB2E-A5D53E6CD866@vmware.com>
Date: Wed, 11 Dec 2019 00:10:31 +0000
From: VMware Security Response Center <security@...are.com>
To: Riccardo Schirone <rschiron@...hat.com>, "oss-security@...ts.openwall.com"
	<oss-security@...ts.openwall.com>
CC: VMware Security Response Center <security@...are.com>
Subject: Re: CVE-2019-5544 openslp 1.2.1, 2.0.0 heap overflow
 vulnerability



> On 12/10/19, 2:25 AM, "Riccardo Schirone" <rschiron@...hat.com> wrote:

    > On 12/06, VMware Security Response Center wrote:
    >> openslp has a heap overflow vulnerability that when exploited may result
   > > in memory corruption and a crash of slpd or in remote code execution.
   > > 
   > > CVE-2019-5544 has been assigned to this issue.
   > > 
   > > Below you may find:
   > > - a copy of the affected code with comments indicating the problem.
   > > - patches for openslp versions 1.2.1 and 2.0.0
    
    > Are those fixes commited anywhere? I could not find them on GitHub.

The patches have been provided to the maintainer of openslp. These are the
same patches as mentioned in our initial post at
https://www.openwall.com/lists/oss-security/2019/12/06/1.

The openslp github repository has not yet been updated, see
https://github.com/openslp-org/openslp.
    
    >> 
    >> VMware would like to thank the 360Vulcan team working with the 2019
    >> Tianfu Cup Pwn Contest for reporting this issue to us.
    >> 
    >> VMware Security Response Center
    >> 
    >> 
    
    > Thanks,
    > -- 
    > Riccardo Schirone
    > Red Hat -- Product Security
    > Email: rschiron@...hat.com
    >PGP-Key ID: CF96E110

Thanks,
VMware Security Response Center
    

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.