|
Message-Id: <1206708021.4858.106.camel@localhost.localdomain> Date: Fri, 28 Mar 2008 13:40:21 +0100 From: Lubomir Kundrak <lkundrak@...hat.com> To: oss-security@...ts.openwall.com Cc: "Steven M. Christey" <coley@...us.mitre.org> Subject: Re: CVE request: silc On Fri, 2008-03-28 at 13:36 +0100, Ludwig Nussel wrote: > Hi, > > This report about a buffer overflow in SILC was posted to bugtraq > recently and doesn't seem to have a CVE number yet: > http://www.coresecurity.com/?action=item&id=2206 By the way core security is wrong there. This can not be exploited into arbitrary code execution, as it will crash on memcpy called with very large (underflown negative) size argument. -- Lubomir Kundrak (Red Hat Security Response Team)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.