|
Message-ID: <20080804122102.39a4c011@redhat.com> Date: Mon, 4 Aug 2008 12:21:02 +0200 From: Tomas Hoger <thoger@...hat.com> To: oss-security@...ts.openwall.com Cc: thijs@...ian.org, coley@...re.org Subject: Re: CVE request: httrack buffer overflow On Mon, 4 Aug 2008 11:42:15 +0200 Thijs Kinkhorst <thijs@...ian.org> wrote: > Please see: > http://www.frsirt.com/english/advisories/2008/2221 > http://www.debian.org/security/2008/dsa-1626 > > Could we get a CVE name assigned to that please? CVE-2008-3429 ? Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL. http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3429 -- Tomas Hoger / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.